FirstBlood-#126 — Open Redirect /drpanel/logout.php
This issue was discovered on FirstBlood v1
On 2021-05-10, iffu Level 5 reported:
Summary
Hi zseano.. I've found an Open Redirect vulnerability on /drpanel/logout.php and the vulnerable paramter is 'ref'.
Steps to Reproduce
- While logging out from your admin account, you will notice the ref parameter in the URL.
- Simply inject the payload /\/www.evil.com in the value of ref parameter.
- Observe that you will be redirected to www.evil.com
Impact
Using this vulnerabiltity, an attacker can send a phishing mail to a victim user and the victim user thinks that it is a legitimate URL and can be trusted and puts his details. But, actually the application redirects him to attacker controlled domain which looks exactly like www.firstblood.com. If the user puts his details, his account may also be taken over
Thanks zseano for making this application. It makes me learn a lot how real world scenarios in bug hunting are.
P4 Low
Endpoint: /drpanel/logout.php
Parameter: ref
Payload: /\/www.evil.com
FirstBlood ID: 1
Vulnerability Type: Open Redirect
There is an open url redirect vulnerability on /logout.php. The code expects it to start with / and does not allow to redirect to external domains but this can be bypassed.