Loading HuntDB...

URL link spoofing

Low
S
Slack
Submitted None
Reported by akaki

Vulnerability Details

Technical details and impact analysis

Phishing
Words such as `http://example.com` and `example.com` included in the message are displayed by URL link. This URL link naturally links to `example.com`. However, we can spoof the link destination by changing the message post request. ```diff POST /api/chat.postMessage HTTP/1.1 Host: example.slack.com ... ... -----------------------------87462859699239992111770463 Content-Disposition: form-data; name="text" -http://example.com +<http://evil.com|http://example.com> -----------------------------87462859699239992111770463 ... ``` The URL link `http://example.com` is displayed in the message, but in fact it is linked to `evil.com`. For example, like [http://example.com](http://evil.com). {F408013} I took a screenshot of Slack on Chrome, so the link destination is displayed in the status bar. However, desktop apps and mobile apps do not have a status bar. ## Impact It is used for phishing attack. For example, an attacker posts a message like the following. Victims click on this URL link will lead to a fake login page. {F408014} In addition, [It is already known](https://twitter.com/buritica/status/970721576034455552) that we can create Slack accounts with the same name. Therefore, an attacker can increase the success rate of phishing by spoofing an influential person. {F408015}

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$250.00

Submitted

Weakness

Phishing