Unauthorized access to GovSlack
Team Summary
Official summary from Slack
Users were able to create a new Workspace within the GovSlack product. This was possible by saving the HTTP POST request to the target /api/signup.createTeam API endpoint when creating a Slack Workspace on slack.com then using the cookies from a failed GovSlack sign-in attempt to call the endpoint, resulting in a GovSlack instance being created for the user. This behavior bypassed security controls which normally require a user to be invited to an existing GovSlack instance or contact Slack to create a new GovSlack instance, and allows the user to access features only available with GovSlack. Slack’s internal team resolved this issue on December 13, 2022, blocking Govslack in /api/signup.createTeam from future use and confirmed that no data from existing workspaces was exposed as a result of this issue.
Vulnerability Details
Technical details and impact analysis
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Bounty
$1500.00
Submitted
Weakness
Improper Authentication - Generic