Slack Patches Critical Desktop Vulnerability

  /     /     /  
Publicated : 23/11/2024   Category : security


Slack Patches Critical Desktop Vulnerability


The remote code execution flaw could allow a successful attacker to fully control the Slack desktop app on a target machine.



Slack has patched a critical remote code execution vulnerability that could enable an attacker to execute arbitrary code in the desktop version of its collaboration software, researchers report.
Oskars Vegeris, a security engineer at Evolution Gaming, discovered the flaw and privately shared it with Slack in January 2020 through HackerOne. The vulnerability has a CVSS score between 9 and 10 and could allow an attacker to take over the Slack desktop application.
With a successful exploit, an attacker could gain access to private keys, passwords, secrets, files, and conversations within Slack. Depending on the configuration of Slack on a target device, they could also gain access to the internal network and explore the environment.
With any in-app redirect - logic/open redirect, HTML or javascript injection its possible to execute arbitrary code within Slack desktop apps, Vegeris explains
in a report
, which details an exploit consisting of an HTML injection, security control bypass, and RCE JavaScript payload.
The exploit was tested and working on the latest versions of Slack for desktop (4.2 and 4.3.2) on Mac, Windows, and Linux, he adds. Slack issued an initial fix for the vulnerability in February; it was disclosed via HackerOne on Aug. 31.
This issue exists in the way Slack posts are made, Vegeris says. Attackers would first need to upload a file containing the RCE payload on their own HTTPS-enabled server. They would then make a new Slack post, which creates a new file on https://files.slack.com with a specific JSON structure. It is possible for them to directly edit this JSON structure and add arbitrary HTML.
JavaScript execution is restricted by Slacks Content Security Policy (CSP), Vegeris notes, and there are security protections for certain HTML tags. For example, iframe, applet, meta, script, and form are all banned, and target attribute is overwritten to _blank for A tags.
However, he found its still possible to inject area and map tags, which can be used to achieve one-click remote code execution. An attacker could edit the JSON structure and inject malicious code using the web user interface that Slack provides, Vegeris says. The payload can be altered to access private conversations, files, and tokens without executing new commands on the victim device.
All a user has to do is click the malicious post shared via Slack, and the code is executed on their PC. The HTML redirects the users desktop app to the attackers website, which replies with RCE JavaScript. The exploit bypasses Slack desktop app env, leaks an Electron object, and executes arbitrary commands on the target device, he explains.
Essentially, this gives an attacker full remote control over the Slack desktop app via overwriting Slack desktop app env functions and providing a tunnel via BrowserWindow to execute arbitrary Javascript, i.e. a weird XSS case with full access to anything the Slack app has - easy access to private channels, conversations, functions etc., Vegeris writes.
The RCE in Slack desktop apps could also be made wormable, meaning it could repost to all user workspaces after its clicked.
The researcher also found emails sent in plaintext are stored unfiltered on Slack servers at https://files.slack.com. With direct access, he explains, they are returned as text/HTML without force-download. He says this functionality could let an attacker store the RCE payload without their own hosting.
Since its a trusted domain, it could contain a phishing page with a fake Slack login page or different arbitrary content which could impact both security and reputation of Slack, he says, noting he did not spot any security headers or other restrictions. 
Slack users are urged to update their desktop applications to version 4.4 to patch the flaw.
The Value of Security Research
Slack, a company worth $20 billion, paid Vegeris only $1,750 for the RCE vulnerability through its bug bounty program. It also published a blog post about the flaw in February and neglected to mention Vegeris work, for which the company recently issued an apology.
Members of the security community voiced their
disappointment
in a payout that seemed to fall short given the amount of time and effort Vegeris put into his writeup and disclosure, as well as the severity of this flaw in a collaboration platform that global organizations use for sensitive discussions across all parts of the business: infosec, design, mergers, and so forth.
Daniel Cuthbert, security expert and coauthor of the OWASP ASVS standard, posted a
Twitter thread
calling on Slack to pay properly for vulnerability research. Exploits like this could sell for far more than $1,750 if marketed on the Dark Web, he noted. If another researcher had discovered the vulnerability first, Slack may not have had the chance to patch it in time.

Last News

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security

▸ Website hacks happened during World Cup final. ◂
Discovered: 23/12/2024
Category: security

▸ Criminal Possession of Government-Grade Stealth Malware ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Slack Patches Critical Desktop Vulnerability