Skip to main content

CVE-2024-38211: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in Microsoft Microsoft Dynamics 365 (on-premises) version 9.1

High
VulnerabilityCVE-2024-38211cvecve-2024-38211cwe-601
Published: Tue Aug 13 2024 (08/13/2024, 17:30:34 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Microsoft Dynamics 365 (on-premises) version 9.1

Description

Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

AI-Powered Analysis

AILast updated: 07/04/2025, 04:39:48 UTC

Technical Analysis

CVE-2024-38211 is a high-severity vulnerability identified in Microsoft Dynamics 365 (on-premises) version 9.1, specifically classified under CWE-601, which corresponds to an Open Redirect vulnerability. Open Redirect vulnerabilities occur when an application accepts untrusted input that could cause the web application to redirect the request to a URL contained within untrusted input. In this case, the vulnerability allows an attacker to craft malicious URLs that redirect users to untrusted external sites. This can be exploited in phishing attacks, where users are tricked into clicking links that appear to be legitimate but lead to malicious websites. The CVSS 3.1 base score of 8.2 reflects a high severity, with the vector indicating that the attack can be performed remotely (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality is high (C:H), integrity is low (I:L), and availability is none (A:N). The vulnerability does not currently have known exploits in the wild, but its presence in a widely used enterprise application makes it a significant risk. The vulnerability affects version 9.0 and presumably 9.1 of Microsoft Dynamics 365 (on-premises), which is a critical business application used for customer relationship management and enterprise resource planning. The description mentions a cross-site scripting vulnerability, but the primary CWE classification and title focus on the open redirect issue, which can be leveraged in social engineering and phishing campaigns to compromise user trust and potentially lead to further attacks such as credential theft or malware deployment.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial. Microsoft Dynamics 365 is widely used across various industries including finance, manufacturing, retail, and public sector entities in Europe. An open redirect vulnerability can be exploited by attackers to conduct sophisticated phishing campaigns targeting employees, partners, or customers, potentially leading to credential compromise or unauthorized access to sensitive business data. Given the high confidentiality impact, sensitive customer or business information could be exposed if attackers leverage the redirect to facilitate further attacks such as credential harvesting or session hijacking. The integrity impact is lower but still relevant if attackers use the redirect to trick users into performing unintended actions. The absence of availability impact means the system remains operational, but the trustworthiness of communications and links is undermined. This can erode user confidence and lead to reputational damage. Additionally, compliance with GDPR and other European data protection regulations could be jeopardized if personal data is compromised as a result of phishing or related attacks stemming from this vulnerability.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately assess their deployment of Microsoft Dynamics 365 (on-premises) versions 9.0 and 9.1 and prioritize patching or upgrading to a version where this vulnerability is fixed once Microsoft releases an official patch. In the absence of a patch, organizations should implement strict input validation and URL whitelisting on any parameters that control redirection within Dynamics 365. Web application firewalls (WAFs) can be configured to detect and block suspicious redirect patterns. Security awareness training should be enhanced to educate users about the risks of phishing and the dangers of clicking on unexpected links, especially those that appear to originate from trusted internal systems. Additionally, organizations should monitor logs for unusual redirect activities and implement multi-factor authentication (MFA) to reduce the risk of account compromise if credentials are phished. Network segmentation and limiting external exposure of the Dynamics 365 on-premises environment can also reduce the attack surface. Finally, organizations should review and update incident response plans to quickly address any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-11T22:36:08.222Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb2be

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/4/2025, 4:39:48 AM

Last updated: 8/7/2025, 8:31:55 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats