Payload delivery via Social Media urls on H1 profile
Medium
H
HackerOne
Submitted None
Actions:
Reported by
tedix
Vulnerability Details
Technical details and impact analysis
**Summary:**
HackerOne allows users to add social media profiles to their HackerOne profile via the [profile/edit](https://hackerone.com/settings/profile/edit) page. Users are allowed to provide their username. Due to improper sanitization, users are allowed to construct their own URLs (except Twitter, which is sanitized and shows inconsistency in security controls). This allows hackers to hide malicious payloads behind the social media buttons on their profile, such as malicious .zip files.
Twitter is sanitized:
{F3232660}
The other Social media platforms are not:
{F3232662}
### Steps To Reproduce
1. Visit [profile/edit](https://hackerone.com/settings/profile/edit)
2. Construct your own payload using the handles.
3. Visit [Tedix](https://hackerone.com/tedix?type=user) profile, click the GitHub button. An .zip file will be downloaded immediately.
{F3232688}
This violates HackerOne's protection which provides users with an alert prior to files being downloaded (e.g. files added to reports).
In the POC on my profile, I have deployed a 'harmless' .zip file. However, this could be a [WinRAR zero day](https://www.bleepingcomputer.com/news/security/winrar-zero-day-exploited-since-april-to-hack-trading-accounts/) or other kind of malicious executable.
## Impact
Attackers are able to construct their own payloads, as long these are below 25 characters. These can be used for payload delivery, redirect, xss or abuse of other vulnerabilities/gadgets at the social platfoms.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Remote File Inclusion