lamarketing.blogg.se

Slack desktop windows
Slack desktop windows













slack desktop windows

"I could make a post to a very popular Reddit community that Slack users around the world are subscribed to," Wells explained. Once the attacker had changed the default download location, "the attacker could have not only stolen the document, but even inserted malicious code in it so that when opened by victim after download (through the Slack application), their machine would have been infected," Wells wrote.Īn attacker wouldn't even have to be a member of a Slack channel to successfully inject the URL, Wells noted-the link could be fed into a channel via an RSS feed, for example, as Slack channels can be set up to subscribe to them. In a blog post, Tenable's David Wells reviewed several ways that this vulnerability could be used maliciously. AdvertisementĮnlarge / A dissected view of a crafted Slack message with a malicious URL that changes the location where the Slack desktop application for Windows saves downloads. This link could be disguised as a Web link-in a proof-of-concept, the malicious Slack attack posed as a link to Google. Once clicked, all future downloads would be dropped onto the attacker's SMB server. That path could be directed to a Server Message Block (SMB) file-sharing location controlled by the attacker. By creating a crafted link posted in a Slack channel, the attacker could alter the default settings of the client-changing the download directory, for example, to a new location with a URL such as “slack://settings/?update=”. The potential attack used a weakness in the way the "slack://" protocol handler was implemented in the Windows application. Slack has issued an update to the Windows desktop client that closes the vulnerability. Tenable reported the vulnerability to Slack via HackerOne. When victims opened the files, they would get a potentially nasty surprise.

slack desktop windows slack desktop windows

This would allow the attacker to not only steal the files that were downloaded by a targeted user, but also allow the attacker to alter the files and add malware to them. The vulnerability, in Slack Desktop version 3.3.7 for Windows, could have been used to change the destination of a file download from a Slack conversation to a remote file share owned by an attacker. On May 17, researchers at Tenable revealed that they had discovered a vulnerability in the Windows version of the desktop application for Slack, the widely used collaboration service. NOAH BERGER/AFP/Getty Images reader comments 17 with















Slack desktop windows