Loading HuntDB...

Open Redirect on https://api.fastly.com/

Low
F
Fastly VDP
Submitted None
Reported by hasn0x

Vulnerability Details

Technical details and impact analysis

Open Redirect
Vulnerability Details: User can be Redirect to malicious site POC: https://api.fastly.com/oauth/authorize?client_id=devhub&state=edge&response_type=code&redirect_uri=https://google.com Steps To Reproduce: Use a browser to navigate to https://api.fastly.com/oauth/authorize?client_id=devhub&state=edge&response_type=code&redirect_uri=https://google.com 1.Navigate to the vulnerable page on the website/application 2.Modify the “redirect_url” parameter by adding a malicious URL as its value. 3.Submit the request and observe that the page is redirected to the malicious URL. screenrecord ## Impact Open redirect vulnerabilities can have various impacts on both users and organizations. Here are some potential consequences: Phishing Attacks: Attackers can exploit open redirect vulnerabilities to craft convincing phishing attacks. They can redirect users to malicious websites that mimic legitimate ones, tricking them into divulging sensitive information such as usernames, passwords, or credit card details. Malware Infections: Redirecting users to malicious websites through open redirect vulnerabilities can lead to the inadvertent download and installation of malware. This can result in the compromise of user devices, theft of personal information, or unauthorized access to sensitive data.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Open Redirect