Home

Sep 2, 2020

Critical Slack Bug Allows Access to Private Channels, Conversations

authorarticle: Master3395
slack.jpg
video: 
youtube: 
sources: 
keywords: slack, bug, critical
Category: General
Posted by: Admin

The RCE bug affects versions below 4.4 of the Slack desktop app.

A critical vulnerability in the popular Slack collaboration app would allow remote code execution (RCE). Attackers could gain full remote control over the Slack desktop app with a successful exploit — and thus access to private channels, conversations, passwords, tokens and keys, and various functions. They could also potentially burrow further into an internal network, depending on the Slack configuration, according to a security report.

The bug (rated between nine and 10 on the CvSS vulnerability-severity scale), was disclosed on Friday and involves cross-site scripting (XSS) and HTML injection. Slack for Desktop (Mac/Windows/Linux) prior to version 4.4 are vulnerable.

“With any in-app redirect-logic/open redirect, HTML or JavaScript injection, it’s possible to execute arbitrary code within Slack desktop apps,” wrote a bug-hunter going by the handle “oskarsv,” who submitted a report on the bug to Slack via the HackerOne platform (earning $1,500). “This report demonstrates a specifically crafted exploit consisting of an HTML injection, security control bypass, and an RCE JavaScript payload.”

According to the disclosed technical writeup, attackers could trigger an exploit by overwriting Slack desktop app “env” functions to create a tunnel via BrowserWindow; to then execute arbitrary JavaScript, in what is “a weird XSS case,” he said.

Technical Details
To exploit the bug, attackers would need to upload a file to their own HTTPS-enabled server with a payload; then, they could prepare a Slack post with an HTML injection containing the attack URL pointing to that payload (hidden in an image). After that, they need only to share that post with a public Slack channel or user. If a user clicks on the booby-trapped image, the code will be executed on the victim’s machine.

As for accomplishing the HTML injection, the issue lies in the way Slack posts are created, according to the researcher.

“[Creating a post] creates a new file on https://files.slack.com with [a specific] JSON structure,” according to the writeup. “It’s possible to directly edit this JSON structure, which can contain arbitrary HTML.”

oskarsv added, “JavaScript execution is restricted by Content Security Policy (CSP) and various security protections are in place for HTML tags (i.e. banned iframe, applet, meta, script, form, etc. and target attribute is overwritten to _blank for A tags). However, it is still possible to inject area and map tags, which can be used to achieve a one-click-RCE.” He further explained that the URL link to the malicious payload could be written within the area tag.

Alternatively, oskarsv also discovered that emails (when sent as plaintext) are stored unfiltered on Slack servers – a situation that can be abused in order to store the RCE payload without attackers needing to own their own hosting.

“Since it’s a trusted domain, it could contain a phishing page with a fake Slack login page or different arbitrary content which could impact both security and reputation of Slack,” he explained. “There are no security headers or any restrictions at all as far as I could tell and I’m sure some other security impact could be demonstrated with enough time.”

Regardless of approach, exploits can be used to execute any attacker-provided command, according to the researcher.

“The payload can be easily modified to access all private conversations, files, tokens, etc., without executing commands on the user’s computer,” he wrote, “[or] access to private files, private keys, passwords, secrets, internal network access, etc.”

Further, the payload could be made “wormable” so that it re-posts to all user workspaces, the researcher added.

Users should make sure their Slack desktop apps are upgraded to at least version 4.4 in order to avoid attacks. The bug was patched in February but has just now been disclosed because of a HackerOne disclosure hiatus on all bugs, which was in effect for several months.

authorarticle: Master3395
slack.jpg
video: 
youtube: 
sources: 
keywords: slack, bug, critical

Comments:

comments powered by Disqus

Return

Sponsored Ads:

Discord

Page 1 of 564  >  >>

The new version of Windows 10 is more or less finished

2004.webp

Sep 22, 2020 | Category: Microsoft | Comments

Launched next month, is in the final test period.

read more…

Mozilla tightens belt, folds two Firefox services

mozilla.jpg

Sep 21, 2020 | Category: General | Comments

The Firefox browser maker is having to trim its sails again.

read more…

The United States bans TikTok and WeChat on Sunday

Tiktok.jpg

Sep 20, 2020 | Category: General | Comments

It is now known that the USA will ban WeChat and TikTok from the Apple App Store in the USA next Sunday.

read more…

Page 1 of 564  >  >>