Lucene search

K
huntrPiyushshukla599511879B0-CDAA-4C03-AF92-DEB54D46284A
HistoryFeb 28, 2022 - 2:48 p.m.

Improper Resolution of Path Equivalence

2022-02-2814:48:51
piyushshukla599
www.huntr.dev
18

0.001 Low

EPSS

Percentile

30.2%

DESCRIPTION

Open redirection vulnerabilities arise when an application incorporates user-controllable data into the target of a redirection in an unsafe way. An attacker can construct a URL within the application that causes a redirection to an arbitrary external domain. This behavior can be leveraged to facilitate phishing attacks against users of the application. The ability to use an authentic application URL, targeting the correct domain and with a valid SSL certificate (if SSL is used), lends credibility to the phishing attack because many users, even if they verify these features, will not notice the subsequent redirection to a different domain.

STEPS TO REPRODUCE:

There is an open redirection vulnerability in the path of = https://microweber.com/get-started?ref=susp#frameurl=

here is " frameurl= " are vulnerable for open redirect

you bypass this vulnerbility using BASE64 encoded mathod

https://bing.com” encode this url in base64 so its looks like = aHR0cHM6Ly9iaW5nLmNvbQ==

SO YOU CAN VISIT URL = https://microweber.com/get-started?ref=susp#frameurl=aHR0cHM6Ly9iaW5nLmNvbQ==

YOU CAN SEE THAT URL REDIRECT TO BING.COM

Impact

An http parameter may contain a URL value and could cause the web application to redirect the request to the specified URL. By modifying the URL value to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials. Because the server name in the modified link is identical to the original site, phishing attempts have a more trustworthy appearance.

0.001 Low

EPSS

Percentile

30.2%

Related for 511879B0-CDAA-4C03-AF92-DEB54D46284A