Saturday, January 3, 2015

Heartbleed at Slack's Status Server

Slack has a bug bounty program on Hackerone

One day I found this status.slack.com

This sub-domain looked different, maybe because this server was outside the main network.

Though I could not find anything suspicious,  lastly I checked the certificate and this was quite outdated

I fired the metasploit module for heartbleed
And BAM !

"
[*] 50.116.50.254:443 - Printable info leaked: @SE&kfT- zR]bjUsf"!98532ED/Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCookie:...........'

And got this as a response from server.


I reported this to Slack and within few minutes got the reply


"
Good catch - the status server sits outside of our main network and got skipped over. It's patched now with a new cert."

I was quite impressed by the response time !

Square's SMTP Server without authentication

Few months back when Square started the bug bounty in Hackerone
After some dorking I found this "api-test.squareup.com"

Yea a test bed.
Usually these test sub-domains are vulnerable because they not maintained after initial development phase.

Visited the sub-domain alas nothing to see.
It was a blank page.

But the world doesn't end here.
Here comes the Nmap.

Scanned and found port 25 was open.

And hopefully it has no authentication
so "telnet api-test.squareup.com 25"



So, I can  send mail using the Square's Server to anyone.

I reported it they fixed it within few week.