Top 25 Open Redirect Bug Bounty Reports
In this article, we will discuss Open Redirect vulnerability, how to find one and present 25 disclosed reports based on this issue.
What is Open Redirect?
Open Redirect is a vulnerability in which the attacker manipulates a web page to redirect the users to unknown destinations (malicious/phishing destinations in most of cases).
A common place where an Open Redirect occurs is in the URL, through a parameter value that can be tampered and set to the attacker’s website. For example:
https://medium.com/r/?url=https://phising-malicious.com
An Open Redirect can very easily lead to a Cross-Site Scripting (XSS) that steals their cookies by redirecting the user to a JavaScript payload, like the one below:
https://medium.com/r/?url=javascript:alert(document.cookie)
Some people consider that this security issue has a low impact, some of them consider it a medium risk and there are many that does not even consider this an issue.
A cyber security expert must be aware of the possible impacts that such a vulnerability can have if it is being exploited. It is primary used in phishing campaigns to bypass filtering and detection, but can be used as a valuable node in many complex attacks that rely on cyber kill chains that will have a huge impact against its targets (example: Accounts Takeover through OAuth Open Redirect).
Types of Open Redirect
- Reflected: the redirection is being made based on a parameter value set through the URL. It is the most common form of Open Redirection. Some URL parameters that are used to handle redirections:
url
rurl
u
next
link
lnk
go
target
dest
destination
redir
redirect_uri
redirect_url
redirect
r
view
loginto
image_url
return
returnTo
return_to
continue
return_path
path
2. Stored: the redirection function/script is stored on the web application through the attacker’s input. All the users that visits the vulnerable and exploited page, will be redirected to the attacker’s website.
3. DOM-Based: it occurs when the application takes input and places it in a sink that redirects the user. Those sinks are the following:
location
location.host
location.hostname
location.href
location.pathname
location.search
location.protocol
location.assign()
location.replace()
open()
domElem.srcdoc
jQuery.ajax()
$.ajax()
XMLHttpRequest.open()
XMLHttpRequest.send()
How to test for Open Redirects
Use Google dorks and search for URLs that contains common redirection parameters.
Some applications verify the parameter value before redirection, so you should put some effort and bypass the filters and other mechanisms, using some tips from here:
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Open%20Redirect
Top 25 Open Redirect Bug Bounty Reports
The reports were disclosed through the HackerOne platform and were selected according to their upvotes, bounty, severity level, complexity, and uniqueness.
#1
Title: Open Redirect on central.uber.com allows for account takeover
Company: Uber
Bounty: $8,000
#2
Title: open redirect in rfc6749
Company: The Internet
Bounty: $3,000
#3
Title: Reflected XSS via Unvalidated / Open Redirect in uber.com
Company: Uber
Bounty: $3,000
#4
Title: XSS and Open Redirect on MoPub Login
Company: Twitter
Bounty: $1,540
#5
Title: Open redirect at https://inventory.upserve.com/http://google.com/
Company: Upserve
Bounty: $1,200
#6
Title: [dev.twitter.com] XSS and Open Redirect
Company: Twitter
Bounty: $1,120
#7
Title: Twitter lite(Android): Vulnerable to local file steal, Javascript injection, Open redirect
Company: Twitter
Bounty: $1,120
#8
Title: [dev.twitter.com] XSS and Open Redirect Protection Bypass
Company: Twitter
Bounty: $1,120
#9
Title: (BYPASS) Open redirect and XSS in supporthiring.shopify.com
Company: Shopify
Bounty: $1,000
#10
Title: Open redirect on https://hq-api.upserve.com/
Company: Upserve
Bounty: $1,000
#11
Title: Trick make all fixed open redirect links vulnerable again
Company: Slack
Bounty: $1,000
#12
Title: Open redirect at app.goodhire.com via ReturnUrl parameter
Company: Inflection
Bounty: $750
#13
Title: Open Redirect in secure.showmax.com
Company: Showmax
Bounty: $550
#14
Title: Open redirect
Company: NordVPN
Bounty: $500
#15
Title: [keybase.io] Open Redirect
Company: Keybase
Bounty: $500
#16
Title: Open redirect in bulk edit
Company: Shopify
Bounty: $500
#17
Title: CBC “cut and paste” attack may cause Open Redirect(even XSS)
Company: Uber
Bounty: $500
#18
Title: Open redirect using theme install
Company: Shopify
Bounty: $500
#19
Title: Open redirect allows changing iframe content in *.myshopify.com/admin/themes/<id>/editor
Company: Shopify
Bounty: $500
#20
Title: XSS on www.mapbox.com/authorize/ because of open redirect at /core/oauth/auth
Company: Mapbox
Bounty: $500
#21
Title: Open redirect using checkout_url
Company: Shopify
Bounty: $500
#22
Title: Interstitial redirect bypass / open redirect in https://hackerone.com/zendesk_session
Company: HackerOne
Bounty: $500
#23
Title: Open Redirect on slack.com
Company: Slack
Bounty: $500
#24
Title: Open Redirect in riders.uber.com
Company: Uber
Bounty: $500
#25
Title: Open Redirect (verkkopalvelu.lahitapiola.fi)
Company: LocalTapiola
Bounty: $400
Bonus: 10 Zero Dollars Open Redirect Reports
#1
Title: Open Redirection in Login — Korean Starbucks
Company: Starbucks
Bounty: $0
#2
Title: Open redirect vuln on login
Company: ZEIT
Bounty: $0
#3
Title: (HackerOne SSO-SAML) Login CSRF, Open Redirect, and Self-XSS Possible Exploitation
Company: HackerOne
Bounty: $0
#4
Title: Open redirect vulnerability in index.php
Company: HackerOne
Bounty: $0
#5
Title: Open Redirect on Gitlab Oauth leading to Acount Takeover
Company: ZEIT
Bounty: $0
#6
Title: Open Redirection in [https://www.hackerone.com/index.php]
Company: HackerOne
Bounty: $0
#7
Title: [http2.cloudflare.com] Open Redirect
Company: Cloudflare
Bounty: $0
#8
Title: Open redirect bypass & SSRF Security Vulnerability
Company: Smule
Bounty: $0
#9
Title: Open redirect on the https://tt.hboeck.de
Company: Hanno’s project
Bounty: $0
#10
Title: http://www.nextcloud.com/wp-includes/js/swfupload/swfupload.swf allows open redirect / site defacement
Company: Nextcloud
Bounty: $0
I would like to thank you for your attention and I wish everybody good luck in their future findings!