Lucene search

K
huntrGonzxph1A0403B6-9EC9-4587-B559-B1AFBA798C86
HistoryJan 30, 2023 - 1:17 a.m.

Open Redirect on "returnUrl=" parameter

2023-01-3001:17:07
gonzxph
www.huntr.dev
36

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.0005 Low

EPSS

Percentile

14.3%

Description

Hello Team while testing the “returnUrl=” parameter on login page it was not vulnerable, but I found another way to get Open Redirect with that parameter

Proof of Concept

Here is the Video POC of this vulnerability
https://drive.google.com/file/d/1UNnRv-E0bwcWWSFSOSDLoTGEdkH4cIKd/view?usp=sharing

Step to Reproduce:

  1. Login your account on https://mainnet.demo.btcpayserver.org/login

  2. Click the link below

https://mainnet.demo.btcpayserver.org/recovery-seed-backup?cryptoCode=BTC&mnemonic=above&passphrase=&isStored=false&requireConfirm=true&returnUrl=//evil.com

  1. Check the “I have written down my recovery phrase and stored it in a secure location”

  2. Then click Done

  3. You will be redirected to evil.com

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.0005 Low

EPSS

Percentile

14.3%

Related for 1A0403B6-9EC9-4587-B559-B1AFBA798C86