注册 登录  
 加关注
   显示下一条  |  关闭
温馨提示!由于新浪微博认证机制调整,您的新浪微博帐号绑定已过期,请重新绑定!立即重新绑定新浪微博》  |  关闭

Tetraph 的博客

IT 计算机网络信息安全技术 数学 统计 云计算 安全漏洞 日常随笔 散文 音乐

 
 
 

日志

 
 

MailChimp’s Login, Olark, Kaneva Sign-in Page Open Redirect Vulnerability  

2014-10-15 20:19:34|  分类: URL 跳转 漏洞 |  标签: |举报 |字号 订阅

  下载LOFTER 我的照片书  |

MailChimp’s Login Page Open Redirect Vulnerability

 
From:

Poc Video:
The vulnerability exists at “http://login.mailchimp.com/?” page with “referrer” parameter, e.g.
http://login.mailchimp.com/?referrer=http://google.com [1]
When a user clicks the URL ([1]) before login, the MailChimp “login page” appears. The user needs to enter his/her username and password. When this is done, the user could be redirected to a webpage different from MailChimp.
My tests were performed on Firefox (26.0) in Ubuntu (12.04) and IE (9.0.15) in Windows 7.

(1) I will use the following tests to illustrate the scenario I painted above.
The redirected webpage address is “http://www.tetraph.com/essayjeans/poems/thatday.html”. It’s one of my webpages. We can suppose that this webpage is malicious.





Olark Open Redirect Vulnerability

 

The vulnerability can be attacked without user login. My tests were performed on Firefox (26.0) in Ubuntu (12.04) and IE (9.0.15) in Windows 7.

(1) I will use one of my webpages for the following tests. The webpage address is “http://www.tetraph.com/essaybeans/reflections/solitude.html“. We can suppose that this webpage is malicious.
 
 
 
 


 
 

Kaneva Sign-in Page Open Redirect Vulnerability


From: http://www.tetraph.com/blog/2014/04/kaneva-sign-page-open-redirect-vulnerability/

The vulnerability exists at “loginSecure.aspx” page with “logretURLNH” parameter, i.e.
http://www.kaneva.com/loginSecure.aspx?logretURLNH=http%3a%2f%2fmsn.com [1]
When unlogged victims click the URL ([1]) above, the Kaneva Sign-in page is displayed. The victims need to enter their username and password. After which, they will be redirected to a webpage different from Kaneva.
My tests were performed on Firefox (26.0) in Ubuntu (12.04) and IE (9.0.15) in Windows 7.

(1) I will use the following tests to illustrate the scenario I painted above.
The redirected webpage address is “http://www.tetraph.com/essaybeans/street_artists/clark_quay.html“. It’s one of my webpages. We can suppose that this webpage is malicious.

 
 
 
 
Credit:
WANG Jing (王晶), a mathematics PhD student from Nanyang Technological University.
Nanyang Technological University & University of Science and Technology of China & No.1 Middle School of Jiaonan (Huangdao)
 
 
 

More:
  评论这张
 
阅读(24)| 评论(0)
推荐 转载

历史上的今天

在LOFTER的更多文章

评论

<#--最新日志,群博日志--> <#--推荐日志--> <#--引用记录--> <#--博主推荐--> <#--随机阅读--> <#--首页推荐--> <#--历史上的今天--> <#--被推荐日志--> <#--上一篇,下一篇--> <#-- 热度 --> <#-- 网易新闻广告 --> <#--右边模块结构--> <#--评论模块结构--> <#--引用模块结构--> <#--博主发起的投票-->
 
 
 
 
 
 
 
 
 
 
 
 
 
 

页脚

网易公司版权所有 ©1997-2017