Top reports from Slack program at HackerOne:
- Mass account takeovers using HTTP Request Smuggling on https://slackb.com/ to steal session cookies to Slack - 841 upvotes, $0
- Remote Code Execution in Slack desktop apps + bonus to Slack - 494 upvotes, $0
- XSS vulnerable parameter in a location hash to Slack - 444 upvotes, $0
- URL link spoofing to Slack - 356 upvotes, $250
- AWS bucket leading to iOS test build code and configuration exposure to Slack - 317 upvotes, $1500
- TURN server allows TCP and UDP proxying to internal network, localhost and meta-data services to Slack - 313 upvotes, $3500
- Slack DTLS uses a private key that is in the public domain, which may lead to SRTP stream hijack to Slack - 167 upvotes, $2000
- XSS in gist integration to Slack - 154 upvotes, $500
- Unauthenticated LFI revealing log information to Slack - 119 upvotes, $0
- Stealing xoxs-tokens using weak postMessage / call-popup redirect to current team domain to Slack - 116 upvotes, $0
- Denial of Service via Hyperlinks in Posts to Slack - 105 upvotes, $1500
- Team members can trigger arbitrary code execution in Slack Desktop Apps via HTML Notifications to Slack - 102 upvotes, $0
- Stored XSS on team.slack.com using new Markdown editor of posts inside the Editing mode and using javascript-URIs to Slack - 101 upvotes, $0
- Lack of URL normalization renders Blocked-Previews feature ineffectual to Slack - 98 upvotes, $1000
- Ability to join an arbitrary workspace by utilizing a proxy to manipulate invite links to Slack - 97 upvotes, $0
- Real Time Error Logs Through Debug Information to Slack - 95 upvotes, $0
- User-assisted RCE in Slack for macOS (from official site) due to improper quarantine meta-attribute handling for downloaded files to Slack - 95 upvotes, $0
- Tricking the "Create snippet" feature into displaying the wrong filetype can lead to RCE on Slack users to Slack - 94 upvotes, $1500
- SSRF via Office file thumbnails to Slack - 93 upvotes, $4000
- Header modification results in disclosure of Slack infra metadata to unauthorized parties to Slack - 91 upvotes, $0
- Many Slack teams can be joined by abusing an improperly configured support@ inbox to Slack - 84 upvotes, $0
- SSRF in api.slack.com, using slash commands and bypassing the protections. to Slack - 79 upvotes, $0
- Unauthorized access to GovSlack to Slack - 72 upvotes, $1500
- OSX slack:// protocol handler javascript injection to Slack - 72 upvotes, $0
- Stored XSS through PDF viewer to Slack - 69 upvotes, $4875
- Bypass invite accept for victim to Slack - 68 upvotes, $1500
- Eavesdropping on private Slack calls to Slack - 66 upvotes, $1000
- Access to some Slack workspace metadata and settings available to unauthorized parties to Slack - 55 upvotes, $7000
- The Custom Emoji Page has a Reflected XSS to Slack - 55 upvotes, $0
- Internal SSRF bypass using slash commands at api.slack.com to Slack - 48 upvotes, $0
- XSS on link and window.opener to Slack - 47 upvotes, $1000
- Linux Desktop application slack executable does not use pie / no ASLR to Slack - 47 upvotes, $100
- Bypass of the SSRF protection in Event Subscriptions parameter. to Slack - 47 upvotes, $0
- [Android] Directory traversal leading to disclosure of auth tokens to Slack - 46 upvotes, $3500
- The POODLE attack (SSLv3 supported) at status.slack.com to Slack - 44 upvotes, $0
- Store XSS to Slack - 43 upvotes, $0
- Information leakage and default open port to Slack - 39 upvotes, $0
- Slack-Corp Heroku application disclosing limited info about company members to Slack - 38 upvotes, $0
- Workspace configuration metadata disclosure to Slack - 37 upvotes, $0
- Private application files can be uploaded to Slack via malicious uploader to Slack - 36 upvotes, $500
- CSS Injection to disable app & potential message exfil to Slack - 35 upvotes, $0
- URL filter bypass in Enterprise Grid to Slack - 31 upvotes, $100
- Bypass two-factor authentication to Slack - 30 upvotes, $0
- Stored XSS(Cross Site Scripting) In Slack App Name to Slack - 29 upvotes, $1000
- Snooping into messages via email service to Slack - 29 upvotes, $0
- DoS on the Direct Messages to Slack - 28 upvotes, $500
- Access of Android protected components via embedded intent to Slack - 28 upvotes, $0
- Subdomain takeover on podcasts.slack-core.com to Slack - 26 upvotes, $100
- Source code leakage through GIT web access at host '52.91.137.42' to Slack - 25 upvotes, $0
- Email html Injection to Slack - 24 upvotes, $250
- Race Condition in account survey to Slack - 24 upvotes, $0
- Rate-limit bypass to Slack - 23 upvotes, $500
- [Screenhero] Subdomain takeover to Slack - 23 upvotes, $0
- HTTP parameter pollution from outdated Greenhouse.io JS dependency to Slack - 23 upvotes, $0
- CSRF in github integration to Slack - 22 upvotes, $500
- Misuse of groups feature allows workspace members to join private channels without being invited to Slack - 20 upvotes, $0
- Stored XSS in files.slack.com to Slack - 17 upvotes, $0
- Uninstalling Slack for Windows (64-bit), then reinstalling keeps you logged in without authentication to Slack - 16 upvotes, $500
- Information Disclosure on stun.screenhero.com to Slack - 14 upvotes, $700
- Bypass to postMessage origin validation via FTP to Slack - 14 upvotes, $0
- Code Injection in Slack's Windows Desktop Client leads to Privilege Escalation to Slack - 14 upvotes, $0
- Bypass of the SSRF protection (Slack commands, Phabricator integration) to Slack - 13 upvotes, $100
- Facebook Takeover using Slack using 302 from files.slack.com with access_token to Slack - 13 upvotes, $0
- Invitation reminder emails contain insecure links to Slack - 12 upvotes, $350
- HTML Injection inside Slack promotional emails to Slack - 12 upvotes, $100
- dom xss in https://www.slackatwork.com to Slack - 12 upvotes, $0
- Open Redirect on slack.com to Slack - 11 upvotes, $500
- Cross-site leak allows attacker to de-anonymize members of his team from another origin to Slack - 11 upvotes, $250
- Open redirect vulnerability to Slack - 11 upvotes, $0
- User can start call in a channel of an unpaid account to Slack - 10 upvotes, $100
- Shared-channel BETA persists integration after unshare to Slack - 9 upvotes, $750
- Relative Path Vulnerability Results in Arbitrary Command Execution/Privilege Escalation to Slack - 9 upvotes, $750
- Creating Post on a restricted channel to Slack - 9 upvotes, $0
- a stored xss issue in https://files.slack.com to Slack - 8 upvotes, $500
- Slack OAuth2 "redirect_uri" Bypass to Slack - 8 upvotes, $0
- Stored XSS Found to Slack - 8 upvotes, $0
- Data exports stored on S3 can be scraped easily to Slack - 8 upvotes, $0
- Possibility to freeze/crash the host system of all Slack Desktop users easily to Slack - 8 upvotes, $0
- Authentication bypass leads to sensitive data exposure (token+secret) to Slack - 7 upvotes, $2000
- "a stored xss issue in share post menu" to Slack - 7 upvotes, $500
- CSV export/import functionality allows administrators to modify member and message content of a workspace to Slack - 7 upvotes, $250
- Session Fixation disclosing email address to Slack - 6 upvotes, $0
- Stored XSS in www.slack-files.com to Slack - 6 upvotes, $0
- Remote file Inclusion - RFI in upload to Slack - 6 upvotes, $0
- RC4 cipher suites detected on status.slack.com to Slack - 6 upvotes, $0
- CSRF - Add optional two factor mobile number to Slack - 5 upvotes, $500
- Stored XSS in Slackbot Direct Messages to Slack - 5 upvotes, $0
- Stored XSS on this link https://sehacure.slack.com/help/requests/ to Slack - 5 upvotes, $0
- Password Policy issue (Weak Protect) to Slack - 5 upvotes, $0
- File upload over private IM channel to Slack - 5 upvotes, $0
- Email information leakage for certain addresses to Slack - 5 upvotes, $0
- a stored xss in slack integration https://onerror.slack.com/services/import to Slack - 4 upvotes, $500
- Content Spoofing all Integrations in https://team.slack.com/services/new/ to Slack - 4 upvotes, $200
- Generate new Test token to Slack - 4 upvotes, $100
- Email enumeration to Slack - 4 upvotes, $0
- csrf to Slack - 4 upvotes, $0
- Broken Authentication (including Slack OAuth bugs) to Slack - 4 upvotes, $0
- URL redirection flaw to Slack - 4 upvotes, $0
- SSRF on https://whitehataudit.slack.com/account/photo to Slack - 4 upvotes, $0
- Stored XSS in Slack.com to Slack - 4 upvotes, $0
- Executing scripts on slack-files.com using SVG to Slack - 4 upvotes, $0
- Reflective XSS can be triggered in IE to Slack - 3 upvotes, $150
- Open Redirect login account to Slack - 3 upvotes, $100
- Team admin can change unauthorized team setting (allow_message_deletion) to Slack - 3 upvotes, $100
- Duplicate of #4550 to Slack - 3 upvotes, $0
- CSRF vulnerability on https://sehacure.slack.com/account/settings to Slack - 3 upvotes, $0
- Content Spoofing to Slack - 3 upvotes, $0
- Stored XSS in Slack (weird, trial and error) to Slack - 3 upvotes, $0
- Trick make all fixed open redirect links vulnerable again to Slack - 2 upvotes, $1000
- Reflected Xss to Slack - 2 upvotes, $500
- Team admin can add billing contacts to Slack - 2 upvotes, $200
- Team admin can change unauthorized team setting (require_at_for_mention) to Slack - 2 upvotes, $200
- Content spoofing at Stripe Integrations to Slack - 2 upvotes, $100
- State parameter missing on google OAuth to Slack - 2 upvotes, $0
- Stored XSS to Slack - 2 upvotes, $0
- flash content type sniff vulnerability in api.slack.com to Slack - 2 upvotes, $0
- User impersonation is possible with incoming webhooks to Slack - 2 upvotes, $0
- CSRF on add comment section to Slack - 2 upvotes, $0
- Stored XSS in Channel Chat to Slack - 2 upvotes, $0
- Open Redirect in Slack to Slack - 2 upvotes, $0
- open redirect in https://slack.com to Slack - 2 upvotes, $0
- Stored XSS in username.slack.com to Slack - 2 upvotes, $0
- TLS1/SSLv3 Renegotiation Vulnerability to Slack - 2 upvotes, $0
- HTTP Strict Transport Policy not enabled on newly made accounts to Slack - 2 upvotes, $0
- Logout any user of same team to Slack - 2 upvotes, $0
- File upload XSS (Java applet) on http://slackatwork.com/ to Slack - 1 upvotes, $200
- an xss issue in https://hunter22.slack.com/help/requests/793043 to Slack - 1 upvotes, $100
- Stored XSS in slack.com (integrations) to Slack - 1 upvotes, $0
- Deleting Teams implemenation to Slack - 1 upvotes, $0
- Link vulnerability leads to phishing attacks to Slack - 1 upvotes, $0
- Reflected Self-XSS in Slack to Slack - 1 upvotes, $0
- Self-XSS in posts by formatting text as code to Slack - 1 upvotes, $0
- Unauthenticated Access to some old file thumbnails to Slack - 1 upvotes, $0