Open Redirect on the nl.wordpress.net

Disclosed: 2018-02-22 22:53:16 By sp1d3rs To wordpress
Low
Vulnerability Details
##Description Hello. I discovered an Open redirect vulnerability on the `nl.wordpress.org`. ##Root cause The 301 Redirect contains full hostname, followed with `@` without trailing slash, when using: ``` GET /@google.com HTTP/1.1 Host: nl.wordpress.net User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:57.0) Gecko/20100101 Firefox/57.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive Upgrade-Insecure-Requests: 1 ``` ``` HTTP/1.1 301 Moved Permanently Date: Thu, 25 Jan 2018 17:26:07 GMT Server: Apache Location: http://[email protected] Content-Length: 242 Keep-Alive: timeout=2, max=100 Connection: Keep-Alive Content-Type: text/html; charset=iso-8859-1 ``` ##POC (Google Chrome) http://nl.wordpress.net/@google.com ##Suggested fix Appending the trailing slash after location hostname should fix the issue. e.g. ``` Location: http://[email protected] ``` => ``` Location: http://nl.wordpress.org/@google.com ``` ## Impact The attacker can redirect the victim to the malicious site using legit *.wordpress.net subdomain name, which can be the copy of the real site, asking for the user credentials.
Actions
View on HackerOne
Report Stats
  • Report ID: 309058
  • State: Closed
  • Substate: resolved
  • Upvotes: 14
Share this report