Covert Redirect: http://tetraph.com/covert_redirect/
Covert Redirect Related to OAuth 2.0 and OpenID:
Weibo's OAuth 2.0 system is susceptible to Attacks. More specifically, the authentication of parameter "&redirct_uri" in OAuth 2.0 system is insufficient. It can be misused to design Open Redirect Attacks to Weibo.
At the same time, it can be used to collect sensitive information of both third-party app and users by using the following parameters (sensitive information is contained in HTTP header.),
It increases the likelihood of successful Open Redirect Attacks to third-party websites, too.
The vulnerabilities occurs at page "oauth2/authorize?" with parameter "&redirect_uri", e.g.
Before acceptance of third-party application:
When a logged-in Weibo user clicks the URL () above, he/she will be asked for consent as in whether to allow a third-party website to receive his/her information. If the user clicks OK, he/she will be then redirected to the URL assigned to the parameter "&redirect_uri".
If a user has not logged onto Weibo and clicks the URL () above, the same situation will happen upon login.
After acceptance of third-party application:
A logged-in Weibo user would no longer be asked for consent and could be redirected to a webpage controlled by the attacker when he/she clicks the URL ().
For a user who has not logged in, the attack could still be completed after a pop-up page that prompts him/her to log in.
(1) Weibo would normally allow all the URLs that belong to the domain of an authorized third-party website. However, these URLs could be prone to manipulation. For example, the "&redirect_uri" parameter in the URLs is supposed to be set by the third-party websites, but an attacker could change its value to make Attacks.
Hence, a user could be redirected from Weibo to a vulnerable URL in that domain first and later be redirected from this vulnerable site to a malicious site unwillingly. This is as if the user is redirected from Weibo directly. The number of Weibo's OAuth 2.0 client websites is so huge that such Attacks could be commonplace.
Before acceptance of the third-party application, Weibo's OAuth 2.0 system makes the redirects appear more trustworthy and could potentially increase the likelihood of successful Open Redirect Attacks of third-party website.
Once the user accepts the application, the attackers could completely bypass Weibo's authentication system and attack more easily.
I used one of my webpages for the following tests. The webpage is "http://tetraph.com/essayjeans/seasons/%E7%A5%AD%E6%98%A5.html". We can suppose it is malicious and contains code that collect sensitive information of both third-party app and users.
Below is an example of a vulnerable third-party domain:
Vulnerable URL in this domain:
Vulnerable URL from Weibo that is related to cjcp.com.cn:
(2) Another method for attackers.
Attackers enter the following URL in browser,
Then, attackers can get URL below,
If users click URL , the same thing will happen as URL .
My tests were performed on Firefox (26.0) in Ubuntu (12.04) and IE (9.0.15) in Windows 7.