While on the attacker’s server, the attacker can not only steal the document, but even modify it before it’s opened by victim after download (through Slack application).” “This would allow all future downloaded documents by the victim to end up being uploaded to an attacker owned file server until the setting is manually changed back by the victim. The vulnerability “could allow a remote attacker to submit a masqueraded link in a slack channel, that ‘if clicked’ by a victim, would silently change the download location setting of the slack client to an attacker owned SMB share,” Tenable researcher David Wells wrote in a Tuesday blog post. A vulnerability in the Slack Desktop client on Windows allowing malicious actors to steal or manipulate downloads from users was discovered by security research firm Tenable, due to a fault in the way Slack treats clickable links, and how the slack:// URI works.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |