Open Redirect in ikus060/rdiffweb
Reported on
Feb 15th 2022
Description
The application has an Open Redirect vulnerability because the data filtering process does not completely prevent attacks.
Proof of Concept
- Step 1: Visit https://rdiffweb-demo.ikus-soft.com/login/?redirect=//evil.com
- Step 2: Login with valid account, you will be redirect to evil.com
Impact
Attackers can redirect users to any website and perform phishing attacks.
Occurrences
@nhiephon
I never received a notification about this report. For completely different reason. I've change the logic to remove the redirection and store the original URL in user session. This change in currently in a developement branch with two-factor authentication using email verification code. You may take a look at
https://github.com/ikus060/rdiffweb/blob/patrik-mfa/rdiffweb/tools/auth_form.py https://github.com/ikus060/rdiffweb/blob/patrik-mfa/rdiffweb/tools/auth_mfa.py