[https://█████████/]&&[https://█████████/] Open Redirection
Medium
L
Lyst
Submitted None
Actions:
Reported by
mandark
Vulnerability Details
Technical details and impact analysis
***Summary***
Hi Team,
An attacker can redirect vicitm on an external website using ``https://████/account/login`` endpoint because ``next`` parameter is not being validated properly.
***Affected URL***
`https://███/account/login/?next=///////////////////////////evil.com`
***Steps to Reproduce***
1) Go https://████/account/login/?next=%2Fapp%2F .
2) Add this payload `////////////////////////////evil.com` to the `?next=` parameter .
3) Registeran account in the normal way .
4) You will be redirected to evil.com website .
***POC***
{F467696}
***References***
* https://hackerone.com/reports/347645
* https://hackerone.com/reports/125003
* https://hackerone.com/reports/411723
## Impact
* Open redirects allow a malicious attacker to redirect people unknowingly to a malicious
website .
* Simplifies phishing attacks .
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Open Redirect