The developers of the work collaboration app Slack have issued a security update for its desktop client following the discovery of a medium-severity download hijack vulnerability that could let attackers modify the location where downloaded files are stored.
Malicious actors could exploit the flaw to steal and spy on users' documents by uploading them to a server they control. From there, the attackers could also manipulate the documents' contents, perhaps damaging data integrity by altering account numbers in financial documents, or injecting malware into an Office document in order to infect users who open them.
Attackers could potentially exploit the flaw – found in desktop version 3.3.7 for Windows by Tenable researcher David Wells – by crafting a malicious hyperlink that changes a document's download location path, and then posting that link into a Slack channel or private direct messaging conversation.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.