Real Time Error Logs Through Debug Information
High
S
Slack
Submitted None
Actions:
Reported by
rubaljain
Vulnerability Details
Technical details and impact analysis
**Summary**: During the assessment, I have found the debug URL on slackb.com which is disclosing the World Wide real time error logs of Slack users.
The information leaked includes the following:
1. User Device Information
2. Redacted Token
3. Client IP Address
4. Description
5. Session ID
6. Team ID
7. User ID
8. User Agent
9. Server Response
10. Timestamp
11. api_call
12. x-amz-cf-id
13. x-amz-id-2
And other user sensitive information.
**Steps to Reproduce**
Open below URL in browser and refresh it to see real time logs.
https://slackb.com/debug
The vulnerable domain here is slackb.com. I have confirmed this with Slack to report this on Hackerone and mention the vulnerable domain.
## Impact
By exploiting this vulnerabilitiy, an attacker can dump the real-time logs and information gained through this is critical which includes the team ID, user ID and redacted token which allows attackers to gather information which can be used later in the attack lifecycle, in order to achieve more than they could if they didn’t get access to such information.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Information Exposure Through Debug Information