Issue metadata
Sign in to add a comment
|
Open Redirection Vulnerability
Reported by
sexypran...@gmail.com,
Sep 27 2017
|
||||||||||||||||||
Issue descriptionHello I found that in Chrome web application, I am able to exploit the system of "username:password@hostname" as a form of authentication to create a redirect. There is no alert or notification while exploiting this mechanism. While I notice in other browsers such as mozilla firefox, IE explorer, There is a proper alert while redirecting as you can see in attached screenshots. Procedure to exploit:- 1- Visit the below URL: http://blog.slicepay.in%2f2017%2f09%2f20%2fapply-win-contest@google.com 2- If the above URL is opened in chrome browser then it'll be redirected to google.com without any notification, But in other browsers it'll show an alert. Attached files:- 1- Screenshot of IE explorer of alert 2-Screenshot of mozilla firefox 3-POC video of webpage opened in google chrome and it was redirected to any other webpage. Kindly Reply!!
,
Sep 27 2017
Thanks for your reply.first of all it works for both http as well as https and secondly this is not a website issue because I can change blog.slicepay.in to anything.com. This issue is equivqlent to open redirect vulnerability and any website is vulnerable to this because of the web browser. The same can't be done on other browsers as they throw an error which clearly states that this might be done to trick the victim(check image). Hacker can successfully redirect user to any website by taking advantage of this vulberability on google chrome. I hope i have explained everyrhing clearly.
,
Jan 4 2018
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||
Comment 1 by infe...@chromium.org
, Sep 27 2017