TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Wanna know what product your competitor is working on? Try Slack

273 pointsby tangoalphaover 10 years ago

44 comments

DHowettover 10 years ago
While I&#x27;m unable to comment on the content of the article, I really have to applaud HostGator&#x27;s error page marketing strategy here.<p><i>We&#x27;ve met with a horrible fate</i> (status code 500) <i>while generating what appears to be a static page. This site is hosted by HostGator! Get yours now!</i>
评论 #8426101 未加载
评论 #8426556 未加载
cilantro1994over 10 years ago
My response to all the people who says it is nothing just the team names<p>Check this screenshot of google teams <a href="http://m.imgur.com/a/eWLEf" rel="nofollow">http:&#x2F;&#x2F;m.imgur.com&#x2F;a&#x2F;eWLEf</a>. There is a team name called viber and google doesn&#x27;t own viber.<p>Check this news that came 2 days back:<a href="http://www.jbgnews.com/2014/10/google-looking-to-rival-whatsapp-viber-with-their-own-mobile-chat-software/222512.html" rel="nofollow">http:&#x2F;&#x2F;www.jbgnews.com&#x2F;2014&#x2F;10&#x2F;google-looking-to-rival-whats...</a><p>Connect the dots. You can infer a lot. It is information disclosure at the finest.<p>Smart thing is to accept it is a problem and address it. Defending to say it is nothing doesn&#x27;t make the problem go away. The fault is on both slack and the companies who are using it.
评论 #8427482 未加载
评论 #8427609 未加载
johannhover 10 years ago
This is something that could definitely have been reported to Slack before disclosing it publicly. Maybe he did that, but it&#x27;s not mentioned in the blog post so I assume he didn&#x27;t.<p>It&#x27;s just a nice thing to do and they might reward you for it. You can still post it on your blog after they released a fix.
评论 #8426250 未加载
评论 #8426027 未加载
评论 #8425930 未加载
评论 #8438127 未加载
tangoalphaover 10 years ago
Sorry that the site was down for long. The site was on poorman&#x27;s hosting (hostgator) that could not take HN traffic and bogged down.<p>Cloudflare, along with flatfile caching by Drupal&#x27;s Boost module came to the rescue. Hope that stays alive for a while now.<p>Regarding not having disclosed this one discretely to Slack:<p>* I have considerable experience in a couple opensource projects including Drupal and have reported multiple vulnerabilities on various occasions for various modules discretely (though mostly of lesser significance and a very narrow&#x2F;rare attack vector) to the right teams through various channels meant for this purpose. As such I am aware of the SOPs for the righteous to follow in case of discovering a vulnerability.<p>* I don&#x27;t think this one is a security issue that would take a professional security expert to crack. Nor could this have been not noticed when Slack tested their product. This is an issue with &#x27;common sense&#x27;. I am pretty sure that Slack designed it this way. It is just the customers that are surprised now. Not Slack.<p>Also, it looks like this was reported earlier to Slack by <a href="https://twitter.com/rootlabs/status/499723782244675584" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;rootlabs&#x2F;status&#x2F;499723782244675584</a> a couple of months ago and it was rejected by Slack as &quot;Not a bug&quot;. However I do acknowledge that I was not aware of this report when I first published the post and hence can not say that I disclosed it only after being rejected by Slack. I would say it was not a security vulnerability to report but just bad design that Slack had put in being totally aware of what it means.
评论 #8427877 未加载
评论 #8427779 未加载
motdiemover 10 years ago
The site seems to be down at the moment.<p>Here is a cached version [1]<p>The gist of it: the slack mac client seems to ask you for your groups before properly authenticating you - hence if you put in the email address of a competitor (or famous person), you can see which groups they belong to, which might be valuable information.<p>(haven&#x27;t tried it myself, just summarising the post)<p>[1] <a href="http://cc.bingj.com/cache.aspx?q=http%3a%2f%2fwww.tanay.co.in%2fblog%2fwanna-know-what-product-your-competitor-working-try-slack.html&amp;d=209021454366&amp;mkt=fr-FR&amp;setlang=en-US&amp;w=jBvUCoMsbckf6gBacpPmVHzRptKPbtw4" rel="nofollow">http:&#x2F;&#x2F;cc.bingj.com&#x2F;cache.aspx?q=http%3a%2f%2fwww.tanay.co.i...</a>
评论 #8425953 未加载
nosoover 10 years ago
<a href="http://webcache.googleusercontent.com/search?q=cache:7u-bEJPVOAkJ:www.tanay.co.in/blog/wanna-know-what-product-your-competitor-working-try-slack.html+&amp;cd=1&amp;hl=en&amp;ct=clnk&amp;gl=uk" rel="nofollow">http:&#x2F;&#x2F;webcache.googleusercontent.com&#x2F;search?q=cache:7u-bEJP...</a><p>cache version as link broken.
jdkananiover 10 years ago
I just realized that any facebook user can signup on <a href="https://facebook.slack.com/" rel="nofollow">https:&#x2F;&#x2F;facebook.slack.com&#x2F;</a> with his fb username.
评论 #8425996 未加载
评论 #8426073 未加载
评论 #8426051 未加载
评论 #8426002 未加载
couchandover 10 years ago
This is ugly, and probably much more of a disclosure than most of these companies were expecting.<p>That being said, everyone railing about &quot;unreleased product names&quot; seem to have forgotten this is exactly the purpose of code names: they&#x27;re pretty much expected to be leaked at some point, but it&#x27;s okay since the stakes are intentionally low. Use code names!
评论 #8426646 未加载
pkorzeniewskiover 10 years ago
Seriously, just the idea of keeping ALL your company internal conversations on a 3rd party server is quite crazy, but to get access without even hacking anything.. I wonder if situations like this will result in business customers more carefully evaluating SaaS solutions that deal with sensitive data, because &quot;in-house&quot; solutions may be old school, but at least a) no one will suddenly terminate the service and b) all data is kept locally.
评论 #8426321 未加载
评论 #8427058 未加载
评论 #8426512 未加载
cocoflunchyover 10 years ago
You don&#x27;t have to use the mac client: <a href="https://slack.com/signin" rel="nofollow">https:&#x2F;&#x2F;slack.com&#x2F;signin</a> and test@microsoft.com yields the same result.
patrickaljordover 10 years ago
Here are the ones for:<p>- amazon - ebay - facebook - apple - google<p><a href="http://imgur.com/a/eWLEf" rel="nofollow">http:&#x2F;&#x2F;imgur.com&#x2F;a&#x2F;eWLEf</a>
评论 #8426025 未加载
评论 #8425989 未加载
jcreiover 10 years ago
I haven&#x27;t tried the hack, but it&#x27;s something that had occurred to me for a while. We&#x27;re using Slack internally and I&#x27;ve been wanting to get everyone in our larger organization to use it. Anyone with an email using our domain would be able to join. Which is ok with me. The only real flaw here is showing which groups are available (many of which can be client names or project names or product names that have yet to be launched). This is a serious lapse on their part
评论 #8426037 未加载
rbinvover 10 years ago
This issue actually seems to be even worse: You don&#x27;t need a valid email alias to get a list of all teams. Just the domain name.
famousactressover 10 years ago
This seems like one of those things that was intentionally a &#x27;feature&#x27; and not an oversight. The oversight was probably not making it clear to users that the team names were effectively public.<p>I think the &quot;this is why not startups|cloud&quot; posts are a bit heavy handed given the actual details of what we&#x27;re talking about here.
roldenburgerover 10 years ago
Sometimes the site isn&#x27;t available, so voila:<p><a href="http://webcache.googleusercontent.com/search?q=cache%3Awww.tanay.co.in%2Fblog%2Fwanna-know-what-product-your-competitor-working-try-slack.html&amp;oq=cache%3Awww.tanay.co.in%2Fblog%2Fwanna-know-what-product-your-competitor-working-try-slack.html&amp;aqs=chrome..69i57j69i58.1317j0j4&amp;sourceid=chrome&amp;es_sm=91&amp;ie=UTF-8" rel="nofollow">http:&#x2F;&#x2F;webcache.googleusercontent.com&#x2F;search?q=cache%3Awww.t...</a>
theunixbeardover 10 years ago
Fun to scan down this list: <a href="http://www.siliconvalley.com/SV150/ci_25548370/" rel="nofollow">http:&#x2F;&#x2F;www.siliconvalley.com&#x2F;SV150&#x2F;ci_25548370&#x2F;</a> Naturally the biggest companies have the most teams.
评论 #8426030 未加载
anonfunctionover 10 years ago
It&#x27;s not just the mac app, even the website signin[1] is affected. Also any email address works, it apparently just checks the domain.<p>[1] <a href="https://slack.com/signin" rel="nofollow">https:&#x2F;&#x2F;slack.com&#x2F;signin</a>
rbinvover 10 years ago
Wow. This is a very serious security flaw. You should never assume that usernames (especially email addresses) are unknown to attackers.
评论 #8426309 未加载
mosselmanover 10 years ago
Somebody already posted some screenshots:<p><a href="http://imgur.com/a/wLShq" rel="nofollow">http:&#x2F;&#x2F;imgur.com&#x2F;a&#x2F;wLShq</a>
评论 #8426008 未加载
lukashedover 10 years ago
Even if they fixed this flaw, you could still reverse this technique by using a dictionary attack against {{ name }}.slack.com (e.g. eng.slack.com), and parse out the given domain name.
评论 #8430063 未加载
kolevover 10 years ago
This is a capitulation - even Google uses Slack instead of Hangouts (although just a few teams); even Microsoft instead of Skype.
评论 #8425965 未加载
评论 #8430588 未加载
评论 #8425936 未加载
bpphillipsover 10 years ago
As previously stated, this isn&#x27;t listing the rooms or groups inside a slack account, it&#x27;s listing the slack accounts that you might potentially be trying to login to.<p>IMO, this seems like more a security issue of the individual creating slack accounts for, a) naming the accounts for a specific (potentially revealing) sub-set of their company, and b) turning on the feature that allows anyone to create an account if their e-mail matches the domain.<p>The company I work for uses Slack but has this second feature turned disabled and our company is not listed when you try and sign in with a bogus e-mail account.
JoeAltmaierover 10 years ago
Its difficult to balance ease of use with vulnerabilities like this one. Our product Sococo requires a moderator to enter email addresses of invitees to a group. This is more secure, but slows down our adoption rate. We&#x27;ve resorted to a more direct marketing approach to overcome this, but in the end our clients are more secure.
whizzkidover 10 years ago
I can see that both Microsoft and Google have tried Slack at least. This doesn&#x27;t mean they are still using it (vice versa).<p>Since Skype is not really light-weight anymore and Google chat did not really take off, It looks like that Slack found himself a good spot in between.
评论 #8426281 未加载
评论 #8426126 未加载
theg2over 10 years ago
We use Slack and I always thought this was an odd behavior. We&#x27;re a part of a major university so our domain is quite large and we can see dozens of other departments and projects using Slack just by putting in our email.
calvin_over 10 years ago
So this is just IRC with lipstick it didn&#x27;t need?<p>Talk about reinventing the wheel.
gosutoover 10 years ago
Slack has a setting that allows anyone with an email address in your domain name to join without being invited. I imagine if you turn that setting off, this problem goes away.
schnableover 10 years ago
I suspect channel names would be much more damaging than team names. This isn&#x27;t really a big deal as long as people know it&#x27;s out there.
spacefightover 10 years ago
WTF - &quot;that matches your domain&quot;. Big ouch.
tszmingover 10 years ago
Slack is on HackerOne, better report to them next time :)<p><a href="https://hackerone.com/slack" rel="nofollow">https:&#x2F;&#x2F;hackerone.com&#x2F;slack</a>
NicoJuicyover 10 years ago
Nice, they eat their own dogfood <a href="http://imgur.com/Xs2QRZa" rel="nofollow">http:&#x2F;&#x2F;imgur.com&#x2F;Xs2QRZa</a>
评论 #8426703 未加载
评论 #8428794 未加载
评论 #8426499 未加载
gambitingover 10 years ago
In the US that could be probably prosecuted as &quot;hacking a computer system&quot;. Very similar to what Aaron Schwartz did.
tiagocesarover 10 years ago
Wow, certainly a big punch on the company face
AndrewKemendoover 10 years ago
Metadata collection at it&#x27;s finest!<p>Seriously this is very interesting and could be valuable. Expect that it will get fixed soon though.
hybridknightover 10 years ago
random@company.com also works. (╯°□°)╯︵ ┻━┻
评论 #8425956 未加载
jpkeisalaover 10 years ago
Actually, is Microsoft really using Slack if they have Lync and Skype?
评论 #8426358 未加载
mattfrommarsover 10 years ago
How can someone use this to their advantage?
评论 #8426715 未加载
acemtpover 10 years ago
The issue seems to be solved
评论 #8431682 未加载
blubberblaseover 10 years ago
try cal.henderson@slack.com
digitalbaseover 10 years ago
link is dead
SoonDeadover 10 years ago
I cannot believe the incompetence.
throwawayHN123over 10 years ago
THIS SITE IS TAKEN DOWN..... THE LINK IS NOT PRESENT EVEN IN CACHED SITE..... WONDER WHY...........
ChristopherKover 10 years ago
Therefore I prefer using encrypted platforms like <a href="https://telegram.org/" rel="nofollow">https:&#x2F;&#x2F;telegram.org&#x2F;</a> or <a href="https://stackfield.com" rel="nofollow">https:&#x2F;&#x2F;stackfield.com</a> - they really take care of privacy and data protection.
评论 #8488322 未加载
评论 #8426434 未加载
dasil003over 10 years ago
While I understand how disclosing group names of customers is a bad idea, everyone here jumping on how serious of a security vulnerability this is is missing the fact that it is a feature, not a bug. It&#x27;s not disclosing anything that was ever intended by the Slack UX designers to be undisclosed, they clearly thought about it and decided to make this tradeoff. This is arguably bad judgement, but it&#x27;s far from the gross incompetence and negligence that most comments here seem to be frothing at the mouth to proclaim. These are <i>group names</i>, not any internal communication or private data. In a world of Shellshocks and 8-figure credit card thefts direct from PoS systems, there is simply no way this qualifies as a &quot;serious security vulnerability&quot;.