FirstBlood-#278 — Open redirect in logout function
This issue was discovered on FirstBlood v1
On 2021-05-15, YouGina Level 3 reported:
Summary
There is an open URL redirect vulnerability in the logout functionality of this application. This allows the attacker to redirect a user to any url of choice.
Steps to reproduce
An attacker can provide the following link to a victim to exploit this vulnerability. The victim will be forwarded to attacker.com:
http://firstbloodhackers.com:49766/drpanel/logout.php?ref=/\/attacker.com/
Additional details:
To be complete I have been able to identify three bypass techniques to exploit this vulnerability:
- /\/attacker.com/
- / /attacker.com (tab -> %09 between slashes)
- //https://example.com//
Using these payloads in the url will look like:
http://firstbloodhackers.com:49766/drpanel/logout.php?ref=%2f%5c%2fexample%2ecom%2f
http://firstbloodhackers.com:49766/drpanel/logout.php?ref=%2f%09%2fexample%2ecom
http://firstbloodhackers.com:49766/drpanel/logout.php?ref=%2f%2fhttps%3a%2f%2fexample%2ecom%2f%2f
P4 Low
Endpoint: /drpanel/logout.php
Parameter: ref=
Payload: /\/attacker.com/
FirstBlood ID: 1
Vulnerability Type: Open Redirect
There is an open url redirect vulnerability on /logout.php. The code expects it to start with / and does not allow to redirect to external domains but this can be bypassed.