apis.google.com - Insecure redirect via __lu parameter (exploited in the wild)
apis.google.com 的 additnow 功能存在开放重定向漏洞(CWE-601),已被用于钓鱼攻击。通过 `__lu` 参数可控制重定向目标,导致用户被引导至恶意网站。该漏洞自 2025 年 9 月起被利用,影响包括绕过垃圾邮件过滤和 SEO 操纵。严重程度为中等。 2025-10-19 03:9:24 Author: seclists.org(查看原文) 阅读量:23 收藏

fulldisclosure logo

Full Disclosure mailing list archives


From: Patrick via Fulldisclosure <fulldisclosure () seclists org>
Date: Thu, 16 Oct 2025 11:09:08 +0000

----------------------------------------------------------------------------
Summary
----------------------------------------------------------------------------
A CWE-601 (Open Redirect) vulnerability has been identified in the additnow
functionality of apis.google.com. The vulnerability has been actively exploited
in targeted phishing attacks since at least September 15, 2025.

----------------------------------------------------------------------------
Affected host(s)
----------------------------------------------------------------------------
- apis.google.com

----------------------------------------------------------------------------
Proof of Concept (PoC)
----------------------------------------------------------------------------
- https://apis.google.com/additnow/l?applicationId=1&__ls=ogb&__lu=URL_HERE
  (parameter "__lu=" controls the redirect target)

----------------------------------------------------------------------------
Impact
----------------------------------------------------------------------------
An open redirect allows an attacker to craft a URL on the affected domain that
redirects users to an arbitrary external site. Impact scenarios include:

- Phishing: attackers can send links that appear to be from google.com but
  redirect to malicious sites.
- Bypass of spam/URL filters by leveraging a high-reputation domain.
- Link manipulation in SEO/social contexts.

----------------------------------------------------------------------------
Severity
----------------------------------------------------------------------------
Medium (confirmed exploitation in the wild)

----------------------------------------------------------------------------
Technical notes
----------------------------------------------------------------------------
- Root cause: insufficient validation of user-supplied redirect targets in the
  "__lu" parameter.
- Redirection is immediate (no further interaction required).

----------------------------------------------------------------------------
Weaponized demo (safe to click)
----------------------------------------------------------------------------
- https://apis.google.com/additnow/l?applicationId=1&__ls=ogb&__lu=%68%74%74%70%73%3A%2F%2F%73%69%76%65%72%74%2E%70%6C
  (this redirects to https://sivert.pl)

----------------------------------------------------------------------------
Timeline
----------------------------------------------------------------------------
- Discovery: 2025-09-15 (exploited by unknown threat actors since at least that date)
- Public disclosure: 2025-10-16 (this post)

----------------------------------------------------------------------------
Contact
----------------------------------------------------------------------------
- Name: Patrick (SivertPL)
- Email: kroppoloe () protonmail ch
- Website: https://sivert.pl
- X: @__tfr

----------------------------------------------------------------------------
Information for the Vendor
----------------------------------------------------------------------------

This is not the first time CWE-601 issues in Google services have been abused by
threat actors.

Please prioritize remediation to prevent further exploitation.

----------------------------------------------------------------------------
Acknowledgements
----------------------------------------------------------------------------
- Shoutout to Google - fix your open redirects!

-- 2025-10-16 SivertPL (kroppoloe () protonmail ch) --
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/


Current thread:

  • apis.google.com - Insecure redirect via __lu parameter (exploited in the wild) Patrick via Fulldisclosure (Oct 18)

文章来源: https://seclists.org/fulldisclosure/2025/Oct/11
如有侵权请联系:admin#unsafe.sh