Stored XSS(Cross Site Scripting) In Slack App Name

Disclosed: 2016-11-22 22:04:56 By imnarendrabhati To slack
Unknown
Vulnerability Details
Hello Slack, This vulnerability is about a Stored Cross Site Scripting Slack Stored XSS In App(App Name) Vulnerable URL(Edit App Page) https://api.slack.com/apps/[appid]/general https://api.slack.com/apps/A21B3V9GA/general Vulnerable Parameter = name Note -Its also work on other user as well. Send this link to victim =================== Reproduction Steps POC Video - https://youtu.be/3jAbPjfPW1o Screen shot is also attached. 1) Go to app edit page https://api.slack.com/apps/[appid]/general https://api.slack.com/apps/A21B3V9GA/general 2) In app name parameter enter the following payload "/><script>alert(/Bhati/)</script> 3) Now open the app page in any other tab https://bhativictim.slack.com/apps/A21B3V9GA--scriptalert-bhati-script 4) You will get a Alert Box 5) We can also send this same link to other user(victim). Thanks, Narendra
Actions
View on HackerOne
Report Stats
  • Report ID: 159460
  • State: Closed
  • Substate: resolved
  • Upvotes: 29
Share this report