Researcher Discovers Major Exposure in the EventBuilder App

  • A researcher has discovered an EventBuilder app exposure through a public Azure Blob.
  • The data includes full names, email addresses, phone numbers, and answers to questionnaires.
  • The mistake could have been avoided easily, but the owners of the data didn’t realize the mixup.

Bob Diachenko has partnered with Clario to uncover a massive exposure in the EventBuilder app, a platform that offers unification and integration potential for various Microsoft products (Teams, Skype, Azure) for the organization of online webinars. In this case, the exposure comes from Microsoft Azure Blob cloud storage instances that contained thousands of CSV/JSON files with details on the webinar registrants.

The data was discovered by using the ‘Grayhat Warfare’ specialized search engine on June 10, 2021, was reported to the EventBuilder team on the same day, and was subsequently addressed.

The data that has been exposed includes the following things:

  • Full names
  • Email addresses
  • Company names and position in the company
  • Phone numbers
  • Questionnaires answered

There is no exact number for the leaked records, but the researcher believes it should be in the hundreds of thousands, based on the file sizes. Here are some samples from the CSV/JSON files that Diachenko and the Clario team accessed during their “expedition.”

Source: Clario
Source: Clario

Some of the above can be used by hackers for a wide range of malicious purposes, and possibly, they have already been abused. The exposure period is unknown, but these instances were indexed by specialized search engines, so finding them should be a matter of time.

We chatted with Bob Diachenko about this possibility, and the researcher told us that the indexing happened four days before his discovery. It's very likely that the blob was accessible for weeks, possibly even months.

Vectra’s CTO, Oliver Tavakoli, commented for TechNadu:

This is an archetypal example of a SaaS provider not paying attention to permissions associated with cloud storage used to store customer information. It is generally a bad idea to co-mingle data that is intended to be publicly available with data that should only be accessible to authenticated or privileged users as it requires discipline around maintaining fine-grained access control – which clearly did not happen in this case.

Indeed, the leaked data was meant to be stored in a partially public space, hosting recorded sessions for link-only access. The mistake was that the organizers of the exposed webinar were putting registrant information into the public blob, which could have easily been avoiding as anyone realizes this is private, sensitive data. The organizers should either have implemented proper access rules and only allow authorized personnel to access that information or not make the system public in the first place.

How to Watch Shetland Season 7 Online From Anywhere
Shetland is back to answer all of the questions that left us hanging at the end of the last series, and you...
Real Madrid Vs Eintracht Frankfurt Live Stream: How to Watch UEFA Super Cup Final Online From Anywhere
The new soccer season is upon us, which means it is time for the UEFA Super Cup Final. Played between the previous...
How to Watch I Am Groot Online On Disney Plus
Marvel's I Am Groot is almost here, which means Marvel fans need to add one more show to their watchlist this summer. We...
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: Chrome, Edge, Firefox, Safari