param allows any external resource to be downloadable | https://████████
High
Vulnerability Details
**Description:**
The following param allows an attacker to trick people into downloading malicious files, scripts and other payloads.
https://██████████?url=https://<MaliciousURL>
PoC
1. I will show you how the page looks normally without any changes. If you directly access https://███ you will be shown the following page. You can click on 'Click to download' but nothing happens.
█████
2. I replace the download param with the url param and entered my attacking vps server ip address as the URL and execute.
█████
3. On my attacking vps server (The black console) you can see that i have received the request from my personal computers ip address showing that it is 100% possible to perform this attack.
https://██████████?url=https://████/poc
████████
## Impact
If an attacker abuses this vulnerability he/she will be able to compromise accounts, computers and identities of people. Potentially Military staff if the attacker had bad intentions.
## Step-by-step Reproduction Instructions
1. Navigate to https://███████
2. Click on 'Click to download'
3. Replace download with url
4. Type in a url and click download
## Product, Version, and Configuration (If applicable)
## Suggested Mitigation/Remediation Actions
Dev needs to add validation to the url param so that it doesn't allow external resources to be downloadable.
Resources:
The only article i can find pertaining to this type of vulnerability
https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html
## Impact
If an attacker abuses this vulnerability he/she will be able to compromise accounts, computers and identities of people. Potentially Military staff if the attacker had bad intentions.
Actions
View on HackerOneReport Stats
- Report ID: 995347
- State: Closed
- Substate: resolved
- Upvotes: 6