Developed By the DokaGroup Laboratory 2008-2011 Belarus Open Redirection Vulnerability

2018.06.29
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-601

################################################################################################# # Exploit Title : Developed By the DokaGroup Laboratory 2008-2011 Belarus Open Redirection Vulnerability # Author [ Discovered By ] : KingSkrupellos from Cyberizm Digital Security Army # Date : 30/06/2018 # Vendor Homepage : doka.com # Tested On : Windows # Category : WebApps # Exploit Risk : Medium # CWE : CWE-601 [ URL Redirection to Untrusted Site ('Open Redirect') ] ################################################################################################# # Description for the Vulnerability : URL Redirection to Untrusted Site ('Open Redirect') A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks.An http parameter may contain a URL value and could cause the web application to redirect the request to the specified URL. By modifying the URL value to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials. Because the server name in the modified link is identical to the original site, phishing attempts have a more trustworthy appearance. Phishing is a general term for deceptive attempts to coerce private information from users that will be used for identity theft. # Google Dork : intext:''разработан лабораторией DokaGroup, 2008-2011'' # Exploit : /website?ref= # Example : LocalHost/website?ref=https://www.DESIREDDOMAINADDRESS.gov ################################################################################################# # Example Site => niti.by/website?ref= => [ Proof of Concept ] => archive.is/ry50p ################################################################################################# # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team #################################################################################################


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top