[BuddyPress 2.9.1] Open Redirect via "wp_http_referer" parameter on "bp-profile-edit" endpoint

Disclosed: 2017-11-02 16:56:46 By ysx To wordpress
Low
Vulnerability Details
Hi, In a similar manner to #228569, it is currently possible to execute authenticated open redirections via the `wp_http_referer` parameter used in the [BuddyPress](https://wordpress.org/plugins/buddypress/) extended user edit screen. ## Proof of concept Upon accessing the below URL, please select the "Update Profile" button, then select the "**←Back to Users**" link. This will redirect a target to the attacker-specified address (in this case, "google.com"). ``` http://instance/wp-admin/users.php?page=bp-profile-edit&wp_http_referer=https://google.com ``` ### Supporting evidence {F229538} Thanks, Yasin
Actions
View on HackerOne
Report Stats
  • Report ID: 277502
  • State: Closed
  • Substate: resolved
  • Upvotes: 7
Share this report