slack-ruby-client is vulnerable to Observable Timing Discrepancy
25
Low Risk
Affected versions of this package use a simple string comparison instead of a constant-time comparison in the Slack::Event::Request#verify! method, leaving it vulnerable to timing attacks. This method is used for verifying incoming HTTP requests from Slack. An attacker could exploit this by carefully measuring the response time of signature verification attempts, allowing them to incrementally guess the correct signature and bypass security validations.
You are affected if you are using a version that falls within the vulnerable range.
slack-ruby-client is vulnerable to Observable Timing Discrepancy in versions 0.14.0 - 2.5.2.
Upgrade the slack-ruby-client library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant