Recent searches
No recent searches
Security exploit in classic chat widget?
Posted Jun 06, 2024
I've noticed on one of my clients sites that they have a cookie of __zlcmid. Zendesk docs say it's the session id, and I believe it's from the classic widget.
It's not set to secure, so will be passed over HTTP connections.
I think there's a clear exploit here where an attacker may have control over a WiFi network, they would only need to get the user to open a http:// link to the target site, and they would be able to steal their Zendesk chat session.
This session may have been authenticated in the app, or the user may have previously proven their identity to the support agent. The attacker could then pose as an authenticated user and convince the agent to reveal personal info or change info on their account.
0
1 comment
Greg Katechis
I didn't have a good answer for this question, so I reached out to our product team that handles this area and they shared the following response with me. I'll just post it verbatim from them so that I don't make a mistake rewording it:
0
Sign in to leave a comment.