vulnerability-penetration-report-summary-salesforce-services_2024-12-26
vulnerability-penetration-report-summary-salesforce-services_2024-12-26
Salesforce, Inc
Salesforce Tower
415 Mission Street, 3rd Floor
San Francisco, CA. 94105
Introduction
This letter supersedes the letter produced by NCC Group on 13 May 2024.
From the dates of 4th of December, through January 29th four (4) consultants from NCC
Group engaged in a web application penetration test for a total of eighty (80) consultant
days of effort reviewing Salesforce’s Core Web applications, Winter ‘24 Product Release. The
Salesforce Core Applications are a suite of Software-as-a-Service (SaaS) applications that
assist customer organizations with business operations such as sales, billing, customer
support, case management, and more. Testing focused on new features and modifications
of existing features that have been implemented since the Summer FY24 iteration of this
assessment, with any additional time spent on time-boxed, exploratory testing. Source code
was not provided.
The following list details the applications and the key focus areas which were in scope for
this engagement:
Sales Cloud
• Sales Engagement
• Opportunity and Leads
• Revenue Intelligence
• All items and subsections under the Security, Identity, and Privacy section in release
notes: https://help.salesforce.com/s/articleView?id=release-
notes.rn_security.htm&release=244&type=5
Service Cloud
• Email to Case
• Chat (formerly Live Agent)
• Salesforce Scheduler
Revenue Cloud
Industries Cloud
• NetZero Cloud
• Health Cloud (Home Health)
• Financial Services Cloud
• Education Cloud / Accounting Subledger
Loyalty Cloud
Chatter
The purpose of this assessment was to identify application-level security issues that could
adversely affect the security of the Salesforce Core application. This assessment was
performed by NCC Group under the guidelines provided in the statement of work for the
engagement.
• Configuration issues such as incorrect use of TLS when connecting to web servers
• Information leaks through exposed files, APIs, inappropriate error handling, and more
• Common web application vulnerabilities including Cross-Site Scripting, SQL Injection, and
Cross-Site Request Forgery
• Authentication and authorization mechanisms
• Ability to obtain inappropriate access to sensitive and private information across users
and tenants
• Business logic and ability to make unauthorized changes
• Privilege escalation from a normal user to higher-privileged roles
• Insecure storage of sensitive data
Limitations
Some limitations were encountered while testing the in-scope features of the in-scope
applications, they are listed below:
Configuration issues led to limited testing availability for Revenue Cloud, Loyalty Cloud and
Service Cloud.
Summary of Findings
During the assessment, NCC Group identified:
• One (1) High Severity Finding
• Two (2) Medium Severity Findings
• One (1) Low Severity Finding
Upon completion of the assessment, all findings were reported to Salesforce along with
recommendations.
Retest Results
On 25th of November, 26th November and 23rd December 2024, three (3) consultants from
NCC Group engaged in a retest of one (1) high finding, one (1) medium finding and one (1)
low severity finding. During the retest, NCC Group identified:
Prepared by NCC Group Security Services for Salesforce Inc.. Portions of this document and the templates used in
its production are the property of NCC Group and cannot be copied (in full or in part) without NCC Group's
permission. While precautions have been taken in the preparation of this document, NCC Group the publisher, and
the author(s) assume no responsibility for errors, omissions, or for damages resulting from the use of the
information contained herein. Use of NCC Group's services does not guarantee the security of a system, or that
computer intrusions will not occur.