The workplace communication platform Slack is understood for being simple and intuitive to make use of. But the corporate mentioned on Friday that one in every of its low-friction options contained a vulnerability, now mounted, that uncovered cryptographically scrambled variations of some customers’ passwords.
When customers created or revoked a hyperlink—referred to as a “Shared Invite Link”—that others might use to enroll in a given Slack workspace, the command additionally inadvertently transmitted the hyperlink creator’s hashed password to different members of that workspace. The flaw impacted the password of anybody who made or scrubbed a Shared Invite Link over a five-year interval, between April 17, 2017, and July 17, 2022.
Slack, which is now owned by Salesforce, says a safety researcher disclosed the bug to the corporate on July 17, 2022. The errant passwords weren’t seen anyplace in Slack, the corporate notes, and will have solely been apprehended by somebody actively monitoring related encrypted community site visitors from Slack’s servers. Though the corporate says it is unlikely that the precise content material of any passwords have been compromised because of the flaw, it notified impacted customers on Thursday and compelled password resets for all of them.
Slack mentioned the state of affairs impacted about 0.5 % of its customers. In 2019, the corporate mentioned it had greater than 10 million day by day lively customers, which might imply roughly 50,000 notifications. By now, the corporate might have practically double that variety of customers. Some customers who had passwords uncovered all through the 5 years might not nonetheless be Slack customers at this time.
“We immediately took steps to implement a fix and released an update the same day the bug was discovered, on July 17th, 2022,” the corporate mentioned in a press release. “Slack has informed all impacted customers and the passwords for impacted users have been reset.”
The firm didn’t reply to questions from WIRED by press time about which hashing algorithm it used on the passwords and whether or not the incident has prompted broader assessments of Slack’s password-management structure.
“It’s unfortunate that in 2022 we’re still seeing bugs that are clearly the result of failed threat modeling,” says Jake Williams, director of cyber risk intelligence on the safety agency Scythe. “While applications like Slack definitely perform security testing, bugs like this that only come up in edge case functionality still get missed. And obviously, the stakes are very high when it comes to sensitive data like passwords.”
The state of affairs underscores the problem of designing versatile and usable internet functions which are additionally architected to silo and restrict entry to high-value information like passwords. If you obtained a notification from Slack, change your password and ensure you have two-factor authentication turned on. You may also view the entry logs to your account.