<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Office 365 Vulnerability of HTML  “baseStriker attack” and Mitigation by PAN Firewall in Custom Signatures</title>
    <link>https://live.paloaltonetworks.com/t5/custom-signatures/office-365-vulnerability-of-html-basestriker-attack-and/m-p/213897#M251</link>
    <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;recently there is one vulnerability found in office 365 vulnerability has been identified in Microsoft Office 365, a remote user can exploit this vulnerability to trigger Security Restriction Bypass on the targeted system.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any way to block the office split&amp;nbsp;HTML in PAN firewall.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Vulnerability Types and Methods:&lt;/STRONG&gt; Found using in the wild to bypass a security feature of Microsoft Office 365, which is originally designed to protect users from malware and phishing attacks called “&lt;STRONG&gt;baseStriker attack”&lt;/STRONG&gt; “.&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Dubbed Safe Links&lt;/STRONG&gt;, the feature has been included in Office 365 software as part of Microsoft's Advanced Threat Protection (ATP) solution that works by replacing all URLs in an incoming email with Microsoft-owned secure URLs. So, every time a user clicks on a link provided in an email, it first sends the user to a Microsoft owned domain, where the company immediately checks the original URL for anything suspicious. If Microsoft's scanners detect any malicious element, it then warns users about it, and if not, it redirects the user to the original link.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Khandesha Kothale&lt;/P&gt;</description>
    <pubDate>Thu, 10 May 2018 12:47:55 GMT</pubDate>
    <dc:creator>Khandesha</dc:creator>
    <dc:date>2018-05-10T12:47:55Z</dc:date>
    <item>
      <title>Office 365 Vulnerability of HTML  “baseStriker attack” and Mitigation by PAN Firewall</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/office-365-vulnerability-of-html-basestriker-attack-and/m-p/213897#M251</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;recently there is one vulnerability found in office 365 vulnerability has been identified in Microsoft Office 365, a remote user can exploit this vulnerability to trigger Security Restriction Bypass on the targeted system.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any way to block the office split&amp;nbsp;HTML in PAN firewall.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Vulnerability Types and Methods:&lt;/STRONG&gt; Found using in the wild to bypass a security feature of Microsoft Office 365, which is originally designed to protect users from malware and phishing attacks called “&lt;STRONG&gt;baseStriker attack”&lt;/STRONG&gt; “.&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Dubbed Safe Links&lt;/STRONG&gt;, the feature has been included in Office 365 software as part of Microsoft's Advanced Threat Protection (ATP) solution that works by replacing all URLs in an incoming email with Microsoft-owned secure URLs. So, every time a user clicks on a link provided in an email, it first sends the user to a Microsoft owned domain, where the company immediately checks the original URL for anything suspicious. If Microsoft's scanners detect any malicious element, it then warns users about it, and if not, it redirects the user to the original link.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Khandesha Kothale&lt;/P&gt;</description>
      <pubDate>Thu, 10 May 2018 12:47:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/office-365-vulnerability-of-html-basestriker-attack-and/m-p/213897#M251</guid>
      <dc:creator>Khandesha</dc:creator>
      <dc:date>2018-05-10T12:47:55Z</dc:date>
    </item>
  </channel>
</rss>

