Open Redirect on the nl.wordpress.net
Low
W
WordPress
Submitted None
Actions:
Reported by
sp1d3rs
Vulnerability Details
Technical details and impact analysis
##Description
Hello. I discovered an Open redirect vulnerability on the `nl.wordpress.org`.
##Root cause
The 301 Redirect contains full hostname, followed with `@` without trailing slash, when using:
```
GET /@google.com HTTP/1.1
Host: nl.wordpress.net
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:57.0) Gecko/20100101 Firefox/57.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: keep-alive
Upgrade-Insecure-Requests: 1
```
```
HTTP/1.1 301 Moved Permanently
Date: Thu, 25 Jan 2018 17:26:07 GMT
Server: Apache
Location: http://[email protected]
Content-Length: 242
Keep-Alive: timeout=2, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
```
##POC (Google Chrome)
http://nl.wordpress.net/@google.com
##Suggested fix
Appending the trailing slash after location hostname should fix the issue.
e.g.
```
Location: http://[email protected]
```
=>
```
Location: http://nl.wordpress.org/@google.com
```
## Impact
The attacker can redirect the victim to the malicious site using legit *.wordpress.net subdomain name, which can be the copy of the real site, asking for the user credentials.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Open Redirect