OPEN REDIRECT

Disclosed: 2022-01-04 16:14:08 By kauenavarro To nutanix
Low
Vulnerability Details
Open Redirect Vulnerability Hello , found open redirect in https://stage.test.dev-iam.xi.nutanix.com/api/iam/authn/v1/oidc/logout?post_logout_redirect_uri=. Go to https://stage.test.dev-iam.xi.nutanix.com/api/iam/authn/v1/oidc/logout?post_logout_redirect_uri=http://evil.com&id_token_hint=test curl -I "https://stage.test.dev-iam.xi.nutanix.com/api/iam/authn/v1/oidc/logout?post_logout_redirect_uri=http://evil.com&id_token_hint=test" HTTP/2 302 content-type: text/html; charset=utf-8 location: http://evil.com date: Wed, 13 Oct 2021 20:55:57 GMT x-envoy-upstream-service-time: 2 server: envoy ##Reference https://hackerone.com/reports/504751 https://portswigger.net/kb/issues/00500100_open-redirection-reflected ## Impact An attacker can use this vulnerability to redirect users to other malicious websites, which can be used for phishing and similar attacks
Actions
View on HackerOne
Report Stats
  • Report ID: 1369806
  • State: Closed
  • Substate: resolved
  • Upvotes: 9
Share this report