Open Redirect via "next" parameter in third-party authentication

Disclosed: 2017-05-17 14:17:51 By ysx To weblate
Medium
Vulnerability Details
Hi, It is currently possible to execute an open redirection attack via the `next` parameter with the inclusion of a triple-slash prefix. ## Proof of Concept ### Redirect URL ``` https://demo.weblate.org/accounts/login/github/?next=///google.com ``` After authenticating, the user will be immediately redirected to the attacker-specified target. I believe this affects all third-party authentication providers on the Weblate platform. Please let me know if you require any additional details regarding this vulnerability. Thanks!
Actions
View on HackerOne
Report Stats
  • Report ID: 223326
  • State: Closed
  • Substate: resolved
  • Upvotes: 3
Share this report