Closed Bug 1891628 Opened 1 year ago Closed 1 year ago

I have discovered an open redirect vulnerability in Firefox version 124.0 that allows malicious redirection of users to arbitrary websites.

Categories

(Firefox :: Security, defect)

defect

Tracking

()

RESOLVED INVALID

People

(Reporter: salahlouffidi, Unassigned)

References

()

Details

(Keywords: reporter-external, Whiteboard: [reporter-external] [client-bounty-form] [verif?])

Attachments

(1 file)

Attached image redirection.png

Open Firefox browser (Version 124.0).
Enter the following URL in the address bar: https://example.com@dd.d.
Press Enter.
Note that the browser redirects to dd.d.
Affected URL:

Hostname: example.com
Subpage: N/A
Environment Details:

Firefox Version: 124.0
Operating System: All
Impact:
This vulnerability poses a significant risk to users as it can be exploited to redirect them to malicious websites without their knowledge, potentially leading to further exploitation or data theft.

Recommendation:
I recommend that the Firefox security team investigates and patches this vulnerability as soon as possible to protect users from potential exploitation.

Flags: sec-bounty?

Putting in foo@example.com is the same as trying to navigate to example.com with a foo username. So example.com@dd.d is like logging into dd.d with a example.com username. That is not a redirect, just direct navigation.

Status: UNCONFIRMED → RESOLVED
Closed: 1 year ago
Resolution: --- → INVALID

https://example.com@dd.d ==> not example.com@dd.d

so https://example.com==> is an url not an username

;)

(In reply to salah eddine louffidi from comment #2)

https://example.com@dd.d ==> not example.com@dd.d

so https://example.com==> is an url not an username

;)

That's really not how URL parsing works. Please see https://url.spec.whatwg.org/#authority-state .

Flags: sec-bounty? → sec-bounty-
Group: firefox-core-security
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: