Loading HuntDB...

session takeover via open protocol redirection on streamlabs.com

Medium
L
Logitech
Submitted None
Reported by f_m

Vulnerability Details

Technical details and impact analysis

Open Redirect
## Summary: Hi Logitech team, on streamlabs.com the endpoint: `streamlabs.com/global/identity?popup=1&r=protocol://merch.streamlabs.com` redirect any authenticated user to a arbitrary protocol, and it merge the redirect link with an access_token. {F1281409} this means that if a malicious app that handle the protocol is installed on the device the access token will be steal by this app and consequently a session takeover is possible on multiple streamlabs domain ## Steps To Reproduce: 1. once authenticated on streamlabs.com go to: streamlabs.com/global/identity?popup=1&r=test://merch.streamlabs.com and intercept the request in burp. 2. grab the redirection link in the response(as a malicious app can do, especially on mobile systems), change the protocol to https and open it in a private browser window 3. finally in the private browser window go to: https://merch.streamlabs.com/ or https://streamlabs.com/<your_store_name> or https://streamlabs.com/my-portal?origin=cs in every case you will be logged in as the victim {F1281408} {F1281407} ##possible fix implement a protocol check on the redirection in this endpoint ## Supporting Material/References: i attached 3 images ## Impact session takeover by malicious apps(on mobile systems, it's more common)

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$200.00

Submitted

Weakness

Open Redirect