Loading HuntDB...

Redirection through referer tag

Low
S
Stripo Inc
Submitted None

Vulnerability Details

Technical details and impact analysis

## Summary: I replaced the referer value https://stripo.email/de/ with www.google.com and it worked, it redirected me to google.com ## Steps To Reproduce: 1. Open URL https://stripo.email/de/subscribe/ 2. Intercept with BurpSuite 3. Change the parameter value of referer and insert any domain you want it will redirect you to that page ## HTTP REQUEST POST /de/subscribe/ HTTP/1.1 Host: stripo.email X-Forwarded-Host: https://www.google.com Accept-Encoding: gzip, deflate Accept: */* Accept-Language: en User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) Connection: close Referer: https://www.google.com Content-Type: application/x-www-form-urlencoded Content-Length: 97 Cookie: XSRF-TOKEN=eyJpdiI6IjM3U1BCZzdtbENpWEc5YWNGXC81MkV3PT0iLCJ2YWx1ZSI6Ik10cWlqTGJJN0pHSitDYlhQelhVRThcL1RQYmVYVGo0XC81UWlDZU80UnhRSGRlSmtmbExqWTJjdmdNZXcyamxIdCIsIm1hYyI6ImFlNzMyN2Q1Yzk3OTg5MmJkYjU3ZDgyZjYwNTQxOGYzN2M5MTZhMWM3ZGE3OTNjYmE2MWZiM2Y4YzljZWU5NWQifQ%3D%3D; laravel_session=eyJpdiI6IkROUlwvMmlma2tmeHhkdVIzT3Y1Qmh3PT0iLCJ2YWx1ZSI6IkhRVDBScUpyVm8xRTdkUm0rNGg3RUY2ODR6azNPTTVJNjRiWFFyYlBHcW9VRE5pbjd3d2xYNEVzS1N3STFrajgiLCJtYWMiOiI5NGQxYTYyNWE3NzUxNTliYTUyMTI4MDcyZGM3YWQwYjg5ZGVhZjM0Zjk3MDY5NDdkYTVlZWI0MDkwOWVmZGJmIn0%3D [email protected]&_token=WFCpqT3ZTAXA2fdBfdLAqsPIIVNv9bRgZBYUfsCh&source=LANDING [list any additional material (e.g. screenshots, logs, etc.)] * [attachment / reference] Video File: Stripo.mkv ## Impact May Lead to Phishing attack or it may be possible that victim machine get malicious if he visited to the malicious webpage redirected by the attacker

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted