Open redirect found on account.brave.com

Disclosed: 2022-06-30 17:47:12 By tabaahi To brave
Medium
Vulnerability Details
## What is open redirect A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks. An http parameter may contain a URL value and could cause the web application to redirect the request to the specified URL. By modifying the URL value to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials. Because the server name in the modified link is identical to the original site, phishing attempts have a more trustworthy appearance. ## Step to reproduce visit https://account.brave.com//example.com/%2F.. you will redirect to example.com ## POC {F1446362} ## Fix / prevention You can prevent redirects to other domains by checking the URL being passed to the redirect function. Make sure all redirect URLs are relative paths – i.e. they start with a single / character. (Note that URLs starting with // will be interpreted by the browser as a protocol agnostic, absolute URL – so they should be rejected too.) If you do need to perform external redirects, consider whitelisting the individual sites that you permit redirects to. ## Impact One of the main uses for this vulnerability is to make phishing attacks more credible and effective. When an Open Redirect is used in a phishing attack, the victim receives an email that looks legitimate with a link that points to a correct and expected domain. Let me know if you have any questions. thanks & best regards
Actions
View on HackerOne
Report Stats
  • Report ID: 1338437
  • State: Closed
  • Substate: resolved
  • Upvotes: 19
Share this report