Open redirection at https://chaturbate.com/auth/login/

Disclosed: 2018-10-22 01:50:43 By shailesh4594 To chaturbate
Low
Vulnerability Details
Hi, ##Summary## An attacker can redirect vicitm on an external website using https://chaturbate.com/auth/login/ endpoint because `next` parameter is not being validated properly. There is a protection existed but it's weak and can be bypassed. `http` keyword is detected and protection works if payload contains `http` at beginning but that check can be bypassed using `Http` keyword. Though, only numeric is allowed after `Http:` so we can use decimal form of external domain/IP-address. In PoC, `3627732462` is decimal form of IP address of google.com. ## Steps To Reproduce: 1. Open https://chaturbate.com/auth/login/?next=Http:3627732462 1. Get logged in 1. You will be redirected on https://google.com instead of a chaturbate website 1. Done ###Suggested Fix: Use more strong regular expression at this endpoint. ## Impact - Simplifies phishing attacks - Reflected File Download
Actions
View on HackerOne
Report Stats
  • Report ID: 411723
  • State: Closed
  • Substate: resolved
  • Upvotes: 54
Share this report