Loading HuntDB...

RTL override char allowed at khanacademy redirect page

Low
K
Khan Academy
Submitted None
Reported by d3f4u17

Vulnerability Details

Technical details and impact analysis

Violation of Secure Design Principles
##Summary Attacker can embed `RTLO` character at the following URL https://www.khanacademy.org/computer-programming/link_redirector?url= to trick the user to download suspicious files. ##Steps to reproduce * Visit https://www.khanacademy.org/computer-programming/link_redirector?url= * add the following payload to the url parameter `https://example.com/so%E2%80%AEgnp.exe` [https://www.khanacademy.org/computer-programming/link_redirector?url=https://example.com/so%E2%80%AEgnp.exe](https://www.khanacademy.org/computer-programming/link_redirector?url=https://example.com/so%E2%80%AEgnp.exe) * After visiting the URL you will see the following link appearing on the page, which appears to be a link to a png file. {F527747} * Click on the link and you will be redirected to an executable file. {F527750} ##Additional Payloads Attacker can even spoof the domain name by adding the following value to the `url` parameter `https://google.com@%E2%80%[email protected]` {F527754} When the user will click on the link the user will be redirected to `https://moc.rettiwt/` which is a completely different host. I have also tested some other malformed URLs which can fool user to redirect to other hosts ``` https://google.com@"twitter.com https://google.com@'twitter.com https://google.com@/twitter.com https://google.com@'#twitter.com (Different domain) ``` ##Mitigation Filter out all the unnecessary special symbols from the URL along with the RTLO char. ##References #299403 #298 [RIGHT TO LEFT OVERRIDE](https://codepoints.net/U+202E) ## Impact * This can be used to spoof URLs on khanacademy. * can be used to fool users to download malicious files.

Report Details

Additional information and metadata

State

Closed

Substate

Informative

Submitted

Weakness

Violation of Secure Design Principles