Kuboid
Open Luck·Kuboid.in
Black Hat2023
Open in YouTube ↗

Sure, Let Business Users Build Their Own. What Could Go Wrong?

Black Hat2,149 views43:34about 2 years ago

This talk demonstrates how low-code/no-code (LCNC) platforms, specifically Microsoft Power Platform, can be exploited by malicious actors to perform account impersonation, data exfiltration, and unauthorized access. The speaker highlights how these platforms often lack traditional security guardrails, leading to insecure configurations and the accidental exposure of sensitive data through automated workflows. The presentation emphasizes the need for security teams to treat LCNC applications as part of their formal security program, implementing automated monitoring and governance to mitigate risks. The talk includes a practical demonstration of how an attacker can manipulate LCNC application inputs to gain unauthorized access to other users' accounts.

The Hidden Security Debt of Low-Code Platforms

TLDR: Low-code/no-code (LCNC) platforms like Microsoft Power Platform are creating massive, unmonitored attack surfaces within enterprises. These environments often lack standard security guardrails, allowing users to inadvertently expose sensitive data or create insecure automated workflows. Pentesters should prioritize auditing LCNC configurations for over-privileged service accounts and excessive data sharing, as these platforms are now prime targets for account impersonation and data exfiltration.

Business users are no longer waiting for IT to build their tools. They are using LCNC platforms to spin up applications that handle sensitive data, automate workflows, and integrate with core enterprise systems. While this shift drives productivity, it creates a massive, invisible security debt. These platforms are not just simple SaaS tools; they are complex development environments that operate outside the traditional software development lifecycle (SDLC). When a business user builds an app in a few hours, they are not performing threat modeling, they are not running static analysis, and they are certainly not considering the implications of their data access patterns.

The Mechanics of LCNC Exploitation

The core issue with LCNC platforms is the abstraction of complexity. By design, these tools hide the underlying infrastructure, which makes them incredibly powerful for non-technical users but dangerous for security. In the Microsoft Power Platform, for instance, an application can be built to collect sensitive information—like PII or Social Security numbers—and store it in a managed database like Dataverse.

The vulnerability often lies in the default configuration. When a user creates an app, they might inadvertently set the permissions to "Everyone in the organization." If that app is then shared, or if an attacker gains access to a single user account, they can potentially access the entire underlying data store. This is a classic case of Broken Access Control, but it is happening at the platform level rather than the application code level.

Consider the automation aspect. Power Automate allows users to trigger actions based on data changes. An attacker can create a flow that triggers whenever a new record is added to a database. If that flow is configured to send an email to an external address, the attacker has a perfect, automated data exfiltration pipeline. Because these flows often run under the context of the user who created them, they can bypass many traditional network-based security controls.

The Identity and Impersonation Problem

One of the most critical findings in recent research is the ease of account impersonation. In many LCNC environments, the application developer embeds their own identity into the application to handle connections to external services like Outlook or Gmail. When other users interact with that application, they are effectively performing actions using the developer's credentials.

If an attacker can compromise a developer's account, they can modify these applications to perform actions on behalf of any user who interacts with them. This is not just about stealing data; it is about gaining a persistent foothold in the environment. During a red team engagement, this technique allows an attacker to move laterally across the organization by piggybacking on the trust relationships established by these LCNC applications.

The OWASP Low-Code/No-Code Top 10 project provides a framework for understanding these threats. It highlights risks like "Account Impersonation" and "Data Leakage," which are exactly what we see in these environments. The lack of visibility is the biggest hurdle. Traditional security tools are built to monitor network traffic or endpoint logs, not the internal logic of a cloud-based LCNC platform.

Auditing LCNC Environments

For a pentester, the engagement strategy must change. You cannot rely on scanning for known vulnerabilities in web servers. Instead, you need to focus on the platform's governance model. Start by enumerating the applications and flows that are shared with "Everyone." Look for connections that use high-privilege accounts or that bridge the gap between internal and external services.

When you find an application, inspect its connections. Are they using a service account, or are they using a user's personal credentials? If you can access the application's configuration, check for hardcoded secrets or insecure data handling practices. The goal is to identify where the platform's "ease of use" features have been turned into security liabilities.

Defensive Strategies for the Modern Enterprise

Security teams must bring LCNC platforms into their formal security program. This means implementing automated monitoring to detect suspicious flow creation or unusual data access patterns. You need to enforce strict governance policies that prevent the sharing of applications with "Everyone" by default.

Furthermore, consider the Shared Responsibility Model in the context of LCNC. The platform provider secures the infrastructure, but the customer is responsible for the security of the applications and the data within them. If you are not actively managing your LCNC environment, you are leaving the door wide open.

The speed at which these platforms allow users to build and deploy applications is a double-edged sword. While it enables innovation, it also allows security flaws to propagate at an unprecedented rate. We need to stop treating LCNC as a "shadow IT" problem and start treating it as a core component of our security architecture. If you are not auditing your LCNC footprint, you are missing one of the most significant attack vectors in the modern enterprise. Start by mapping out what is running in your environment today, and you will likely find more than a few surprises.

Talk Type
research presentation
Difficulty
intermediate
Has Demo Has Code Tool Released


Black Hat USA 2023

118 talks · 2023
Browse conference →
Premium Security Audit

We break your app before they do.

Professional penetration testing and vulnerability assessments by the Kuboid Secure Layer team. Securing your infrastructure at every layer.

Get in Touch
Official Security Partner
kuboid.in