Category: General|Mar 22, 2020 | Author: Admin

Slack Patch Critical Vulnerability Allowing Automated Account Takeovers

Share on

A critical security vulnerability existed in Slack that could have lead to a massive data breach affecting its customers. Slack also fixed another vulnerability together with this one.

Slack Vulnerability Allowing Account Takeovers Reportedly, bug hunter Evan Custodio discovered a critical vulnerability affecting Slack. As per his findings, the vulnerability could allow automated account takeovers, ultimately leading to a data breach.

While disclosing the flaw to Slack via its HackerOne bug bounty program, the researcher shared a detailed report about the exploit. As revealed, he found an HTTP Request Smuggling bug that could allow automated hacking of arbitrary customer accounts.

This researcher exploited an HTTP Request Smuggling bug on a Slack asset to perform a CL.TE-based hijack onto neighboring customer requests.

This hijack forced the victim into an open-redirect that forwarded the victim onto the researcher’s collaborator client with slack domain cookies. The posted cookies in the customer request on the collaborator client contained the customer’s secret session cookie.

Thus, an adversary could exploit the flaw to continue taking over random accounts, something that can lead to a huge breach. A potential attacker could also create bots to execute the attacks, thus involving automation for swift breaches. Following his report, Slack confirmed by reproducing the exploit and worked out a fix for the bug. Both the researcher and the vendors agreed to disclose the bug publicly after ensuring a patch was implemented.

They have now disclosed the bug after fixing it, whilst acknowledging the researcher’s efforts with a $6500 bounty. Other Slack Vulnerabilities Also Fixed Alongside the above, Slack also disclosed another critical vulnerability that awarded the researcher an additional $3500 bounty.

As revealed through the report, the TURN server allowed proxying UDP packets and TCP connections to interact with the internal Slack network. The researcher Sandro Gauci, who reported this flaw, also won another bounty of $2000 for reporting a high-severity vulnerability. As revealed through the bug report, this flaw allowed a man-in-the-middle hijack and handle SRTP stream in place of Slack. While the researcher discovered and reported this vulnerability around a year ago, Slack disclosed the bug only recently after ensuring a thorough fix. Let us know your thoughts in the comments.

Sponsored Ads:

Comments:


We've heard it before, but Cloudflare may have solved the big web bug

Category: IT|Sep 29, 2022 | Author: Admin

Could this be the start of something big?

Category: IT|Sep 28, 2022 | Author: Admin

Takes randomly restart

Category: Apple|Sep 27, 2022 | Author: Admin

There are already problems with them

Category: Apple|Sep 26, 2022 | Author: Admin

GTA VI-HACKER (17) should be arrested

Category: General|Sep 25, 2022 | Author: Admin

25 percent consider quitting up

Category: General|Sep 24, 2022 | Author: Admin

This is Logitech's Sky-Handened with up to 12 hours of gaming

Category: General|Sep 23, 2022 | Author: Admin

The Taliban think PUBG is too violent

Category: General|Sep 22, 2022 | Author: Admin

If YouTube crashes on the iPhone, this is the solution

Category: General|Sep 21, 2022 | Author: Admin

See the graphics RTX 40 is capable of - here are the prices - DLSS 3 only to RTX 40

Category: General|Sep 20, 2022 | Author: Admin

Now the Rockstar Monster leak comments on the GTA VI

Category: General|Sep 19, 2022 | Author: Admin

Snapchat, Tiktok and Instagram can destroy the iPhone 14 Pro

Category: Apple|Sep 18, 2022 | Author: Admin

Updated: Uber's employees did not believe what they saw: Must have become the pig-hack by 18-year-old

Category: General|Sep 17, 2022 | Author: Admin

Only one mobile lasts longer than the iPhone 14 Pro Max in a surf test

Category: Apple|Sep 16, 2022 | Author: Admin

This is the date The Sims 4 goes free

Category: General|Sep 15, 2022 | Author: Admin
more