Open Redirect filter bypass through '\' character via URL parameter
Medium
Vulnerability Details
Hi, I hope I find you all safe and good regarding those hard times nowadays.
## Summary:
Found an Open Redirect vulnerability on http://meta.myndr.net by bypassing the trusted domain filter using a '\' character.
I was able to get the original redirection URL from the register button located at http://dashboard.myndr.net/auth/login
Original Redirection URL
```http://meta.myndr.net/latest/meta-data/filter-id/add?ref_url=http://dashboard.myndr.net/auth/register?id= ```
Malicious URL
```http://meta.myndr.net/latest/meta-data/filter-id/add/?ref_url=http://phishing.com\dashboard.myndr.net/../../../ ```
The vulnerable URL parameter is ```ref_url```
The trusted domain (or string) is ```dashboard.myndr.net```
It can be bypassed only from its beginning! (between ```http://``` and the string) and not after ```.net```
## Steps To Reproduce:
Navigate to : ```http://meta.myndr.net/latest/meta-data/filter-id/add/?ref_url=http://phishing.com\dashboard.myndr.net/../../../```
You will be redirected to ```phising.com``` domain
## PoC: attached to the report
## Impact
1. Phishing campaigns can be initiated using such a vulnerability
2. It is an efficient way to bypass monitoring and email filters within an organization (the organization can check the "trust" level of each domains that they receive emails from)
Actions
View on HackerOneReport Stats
- Report ID: 840736
- State: Closed
- Substate: resolved
- Upvotes: 38