Open Redirection Security Filter bypassed

Disclosed: 2015-06-28 15:50:24 By securityidiots To vimeo
Unknown
Vulnerability Details
Hi, The application is vulnerable to Open Redirection using a basic filter bypass which it was using for security against open redirection. Here is the vulnerable link: https://vimeo.com/tools/edit?image=http://securityidiots.com?vimeocdn.com/.png Weakness in filter against Open Redirect.: Actually the application is using the below given filters against open redirection. 1. URL must contain "vimeocdn.com/" 2. It should end with an image extention for example jpg, png etc The problem with the above filter can be seen in my payload, as i included both of the requirements and still redirected the user to my url. Solution : Below changes can be made to the security. If "https://f.vimeocdn.com/" is the URL for images then hardcode it and take the rest of input from GET so that in any case we will have "https://f.vimeocdn.com/" before the URL and user wont be able to do a open redirect to any other domain.
Actions
View on HackerOne
Report Stats
  • Report ID: 44157
  • State: Closed
  • Substate: resolved
  • Upvotes: 1
Share this report