I have discovered an open redirect vulnerability in Firefox version 124.0 that allows malicious redirection of users to arbitrary websites.
Categories
(Firefox :: Security, defect)
Tracking
()
People
(Reporter: salahlouffidi, Unassigned)
References
()
Details
(Keywords: reporter-external, Whiteboard: [reporter-external] [client-bounty-form] [verif?])
Attachments
(1 file)
|
38.26 KB,
image/png
|
Details |
Open Firefox browser (Version 124.0).
Enter the following URL in the address bar: https://example.com@dd.d.
Press Enter.
Note that the browser redirects to dd.d.
Affected URL:
Hostname: example.com
Subpage: N/A
Environment Details:
Firefox Version: 124.0
Operating System: All
Impact:
This vulnerability poses a significant risk to users as it can be exploited to redirect them to malicious websites without their knowledge, potentially leading to further exploitation or data theft.
Recommendation:
I recommend that the Firefox security team investigates and patches this vulnerability as soon as possible to protect users from potential exploitation.
Comment 1•1 year ago
|
||
Putting in foo@example.com is the same as trying to navigate to example.com with a foo username. So example.com@dd.d is like logging into dd.d with a example.com username. That is not a redirect, just direct navigation.
| Reporter | ||
Comment 2•1 year ago
|
||
https://example.com@dd.d ==> not example.com@dd.d
so https://example.com==> is an url not an username
;)
Comment 3•1 year ago
|
||
(In reply to salah eddine louffidi from comment #2)
https://example.com@dd.d ==> not example.com@dd.d
so https://example.com==> is an url not an username
;)
That's really not how URL parsing works. Please see https://url.spec.whatwg.org/#authority-state .
Updated•1 year ago
|
Updated•1 year ago
|
Updated•1 year ago
|
Description
•