Business Collaboration Platforms like Microsoft Teams and Slack enable teamwork by supporting text chatting and third-party resource integration. A user can access online file storage, make video calls, and manage a code repository, all from within the platform, thus making them a hub for sensitive communication and resources. The key enabler for these productivity features is a third-party application model. We contribute an experimental security analysis of this model and the third-party apps. Performing this analysis is challenging because commercial platforms and their apps are closed-source systems. Our analysis methodology is to systematically investigate different types of interactions possible between apps and users. We discover that the access control model in these systems violates two fundamental security principles: least privilege and complete mediation. These violations enable a malicious app to exploit the confidentiality and integrity of user messages and third-party resources connected to the platform. We construct proof-of-concept attacks that can: (1) eavesdrop on user messages without having permission to read those messages; (2) launch fake video calls; (3) automatically merge code into repositories without user approval or involvement. Finally, we provide an analysis of countermeasures that systems like Slack and Microsoft Teams can adopt today.
翻译:微软团队和 Slack 等商业协作平台通过支持文本聊天和第三方资源整合而促成团队合作。 用户可以从平台内部访问在线文件存储、视频电话和管理代码存储器, 从而使其成为敏感通信和资源的中心。 这些生产率特征的关键促进因素是第三方应用模式。 我们对这一模型和第三方应用程序进行了实验性安全分析。 进行这项分析具有挑战性,因为商业平台及其应用程序是封闭源系统。 我们的分析方法是系统调查应用程序与用户之间可能的不同类型的互动。 我们发现,这些系统中的访问控制模式违反了两项基本安全原则: 最少的特权和彻底调解。 这些违规行为使得它们成为恶意的应用程序,可以利用用户信息以及与平台相连的第三方资源的保密性和完整性。 我们构筑了验证概念攻击,这些攻击可以:(1) 未经用户许可就窃听用户信息;(2) 启动虚假的视频电话;(3) 不经用户批准或参与而自动将代码合并到存储库中。 最后,我们分析了Slack和微软团队等系统今天可以采用的反措施。