GET based Open redirect on [streamlabs.com/content-hub/streamlabs-obs/search?query=]
Low
L
Logitech
Submitted None
Actions:
Reported by
raywando
Vulnerability Details
Technical details and impact analysis
## Summary:
Description: in the following link, the parameter `query` is reflecting in multiple places, one of them is in the `<meta>` tag in the head section of the HTML source, the reflection is in the `content` attribute to be precise (check the below image)
{F983200}
And i was able to break out of the `content` attribute and was able to bypass the Cloudflare protection that wouldnt let me to add `http-equiv` attribute by using `%00` char to finally achieve the following redirect using a crafted payload
{F983205}
PoC: `https://streamlabs.com/content-hub/streamlabs-obs/search?query=0;url=https://google.com"%20http-%00equiv="refresh"`
Payload: `0;url=https://google.com/document.cookie"%20http-%00equiv="refresh"`
Readable payload: `0;url=https://google.com/" http-equiv="refresh"`
## Impact
Open redirect
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Bounty
$100.00
Submitted
Weakness
Open Redirect