đź“™
AppSec
  • Overview
  • Write Ups Compilations/Resources
  • Main Resources
  • Labs
  • Cross Site Request Forgery
    • Cross Site Request Forgery (CSRF)
      • Write-ups
      • Source Code Examples
      • Labs
  • Missing Access Controls
    • Missing Access Controls
      • Write-ups
      • Source Code Examples
      • Resources
      • Testing Tips
  • LFI / Directory Traversal
    • Local File Inclusion
      • Local File Inclusion Writeups
      • Source Code Examples
      • Labs
  • XXE
    • XML External Entity (XXE)
      • Write-ups
      • Source Code Examples
      • Labs
      • More Writeups
      • Payloads
      • Resources
  • Injection
    • Command Injection
      • Writeups
    • Server-Side Template Injection
      • Server-Side Template Injection Writeups
      • More Write-ups
      • Source Code Examples
      • Labs
      • Resources
      • Payloads
      • Tools
    • SQL Injection
      • SQLI Write-ups
      • Source Code Examples
      • More Write-ups
      • Labs
      • Resources & Tools
  • SSRF
    • Server-Side Request Forgery (SSRF)
      • SSRF Write-ups
      • Source Code Review
  • Unvalidated Redirects and Forwards
    • Unvalidated Redirects and Forwards
      • Writeups
      • Source Code Examples
  • Verbose Error Messages and Stack Traces
    • Verbose Error Messages and Stack Traces
      • Write-ups
Powered by GitBook
On this page
  • Showmax - Unvalidated Redirect and XSS
  • Upserve URL Pathway
  • Hanno
  • Others

Was this helpful?

  1. Unvalidated Redirects and Forwards
  2. Unvalidated Redirects and Forwards

Writeups

PreviousUnvalidated Redirects and ForwardsNextSource Code Examples

Last updated 4 years ago

Was this helpful?

Showmax - Unvalidated Redirect and XSS

Researcher discovered an unvalidated redirect on a Showmax in a payment method flow. Researcher received an email advertising Showmax 14 day free trial. Clicking the link directed the researcher to a payment page. In on of the HTTP request bodies the following URL was found. The URL parameter redirection_url was found to not only be vulnerable to unvalidated redirects, but also to XSS.

https://secure.showmax.com/v97.3/website/payment/subscriptions/zooz_card/three_d_secure?redirection_url=https://payu.co.za.....

Changing the redirection_url to google will redirect the user to google. Changing the parameter to contain the XSS payload javascript:%250Aalert(1) will trigger reflected XSS.

https://secure.showmax.com/v97.3/website/payment/subscriptions/zooz_card/three_d_secure?redirection_url=https://google.com to https://secure.showmax.com/v97.3/website/payment/subscriptions/zooz_card/three_d_secure?redirection_url=javascript:%250Aalert(1)

Researcher thankfully provided a detailed blog post here:

Upserve URL Pathway

Researcher discovered unvalidated redirect on URL https://inventory.upserve.com/ in the applications root URL path. Appending any URL to the URL will redirect the user there. Thus the following URL redirects to google:

https://inventory.upserve.com/http://google.com/

Hanno

Researcher discovered Open Redirect on endpoint https://blog.fuzzing-project.org/exit.php?url= <url>. The HTTP URL parameter url is vulnerable, supplying any attacker controlled site to the parameter will redirect the user there.

Entering the following URL into a web browser would redirect the user to google.com:

https://blog.fuzzing-project.org/exit.php?url=google.com

Others

Reflected XSS
GitHub Gist - Account takeover via open redirect - $10,000 Bountydevcraft.io
http://ngailong.com/uber-login-csrf-open-redirect-account-takeover/ngailong.com
Hanno's projects disclosed on HackerOne: Open redirect on...HackerOne
Logo
Showmax disclosed on HackerOne: Open Redirect in secure.showmax.comHackerOne
Logo
Upserve disclosed on HackerOne: Open redirect at...HackerOne
Logo
https://xpoc.pro/oauth-authentication-bypass-on-airbnb-acquisition-using-weird-1-char-open-redirect/
Airbnb - Chaining Third-Party Open Redirect into Server-Side Request Forgery (SSRF) via LivePerson ChatBrett Buerhaus
Godaddy XSS affects parked domains redirector/processor!Seekurity
https://www.mohamedharon.com/2019/02/still-work-redirect-yahoo-subdomain-xss.htmlwww.mohamedharon.com
BUG BOUNTY: How I earned $550 in less than 5 minutes. “Open Redirect chained with rXSS”Medium
Logo
Logo