Loading HuntDB...

GET based Open redirect on [streamlabs.com/content-hub/streamlabs-obs/search?query=]

Low
L
Logitech
Submitted None
Reported by raywando

Vulnerability Details

Technical details and impact analysis

Open Redirect
## Summary: Description: in the following link, the parameter `query` is reflecting in multiple places, one of them is in the `<meta>` tag in the head section of the HTML source, the reflection is in the `content` attribute to be precise (check the below image) {F983200} And i was able to break out of the `content` attribute and was able to bypass the Cloudflare protection that wouldnt let me to add `http-equiv` attribute by using `%00` char to finally achieve the following redirect using a crafted payload {F983205} PoC: `https://streamlabs.com/content-hub/streamlabs-obs/search?query=0;url=https://google.com"%20http-%00equiv="refresh"` Payload: `0;url=https://google.com/document.cookie"%20http-%00equiv="refresh"` Readable payload: `0;url=https://google.com/" http-equiv="refresh"` ## Impact Open redirect

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$100.00

Submitted

Weakness

Open Redirect