(BYPASS) Open redirect and XSS in supporthiring.shopify.com

Disclosed: 2016-11-21 13:24:43 By jamesclyde To shopify
Unknown
Vulnerability Details
Hello, The users can be redirected to some other site which is in control of the attacker from Vulnerable parameter: path= You have a protection here at path= but it bypass the parameter if you add a double slash, like %2F%2F. Let's say user is attacker asked victim to came to this page: : http://supporthiring.shopify.com/apps/locksmith/resource/pages/gauntlet-challenge?&path=%2F%2Fevil.com Victim will be see a 404 error page and after 2 seconds he will be redirected to: https://evil.com These can be controlled by the attacker and used in other attacks Works in all browsers!!
Actions
View on HackerOne
Report Stats
  • Report ID: 158434
  • State: Closed
  • Substate: resolved
  • Upvotes: 36
Share this report