Fake URL + Additional vectors for homograph attack

Disclosed: 2015-05-09 21:03:08 By abze To security
Unknown
Vulnerability Details
Hello! I would like to report about a new issue based on "@" character in URL. It shows user real URL but when he clicks "Proceed", he is redirected to another website. For example, it seems as normal HackerOne URL: [https://hackerone.com/bugs?team_id=0&sort_type=latest_activity&sort_direction=descending&state=open&limit=25&page=1&substates%5B%5D=new&substates%5B%5D=triaged&substates%5B%5D=resolved&substates%5B%5D=wont-fix&substates%5B%5D=not-applicable&substates%5B%5D=duplicate&substates%5B%5D=needs-more-info&substates%5B%5D=spam&text_query=&report_id=59426](https://hackerone.com ∕ bugs?team_id=0&sort_type=latest_activity&sort_direction=descending&state=open&limit=25&page=1&substates%5B%5D=new&substates%5B%5D=triaged&substates%5B%5D=resolved&substates%5B%5D=wont-fix&substates%5B%5D=not-applicable&substates%5B%5D=duplicate&substates%5B%5D=needs-more-info&substates%5B%5D=spam&text_query=&[email protected]) `Markdown: [https://hackerone.com/bugs?team_id=0&sort_type=latest_activity&sort_direction=descending&state=open&limit=25&page=1&substates%5B%5D=new&substates%5B%5D=triaged&substates%5B%5D=resolved&substates%5B%5D=wont-fix&substates%5B%5D=not-applicable&substates%5B%5D=duplicate&substates%5B%5D=needs-more-info&substates%5B%5D=spam&text_query=&report_id=59426](https://hackerone.com ∕ bugs?team_id=0&sort_type=latest_activity&sort_direction=descending&state=open&limit=25&page=1&substates%5B%5D=new&substates%5B%5D=triaged&substates%5B%5D=resolved&substates%5B%5D=wont-fix&substates%5B%5D=not-applicable&substates%5B%5D=duplicate&substates%5B%5D=needs-more-info&substates%5B%5D=spam&text_query=&[email protected])` But when You click "Proceed", You are getting redirected to http://google.com/home Here is shorter variant of this vulnerability: [http://google.com/home](http://google.com ⁄ [email protected]) `Markdown: [http://google.com/home](http://google.com ⁄ [email protected])` It is because modern browsers interpret this scheme like this "http://authorization_data@website", so, when You click on URL, they get You redirected to "http://website". Also, additionally to report #58612, here are new vectors that still allow to reproduce homograph attack: [http://google.com](http:\\/gоogle.com) `Markdown: [http://google.com](http:\\/gоogle.com)` [http://google.com](http:/\\/gоogle.com) `Markdown: [http://google.com](http:/\\/gоogle.com)` [http://google.com](http:gоogle%2Ecom) `Markdown: [http://google.com](http:gоogle%2Ecom)` Thanks!
Actions
View on HackerOne
Report Stats
  • Report ID: 59469
  • State: Closed
  • Substate: resolved
  • Upvotes: 3
Share this report