How a Welcome Email Can Be Used for Malicious Redirection
作者在评估中发现欢迎邮件系统存在开放重定向漏洞。攻击者可篡改下载链接中的androidUrl和iosUrl参数,导致用户被重定向至恶意网站。 2025-6-6 05:2:58 Author: infosecwriteups.com(查看原文) 阅读量:7 收藏

Ehtesham Ul Haq

Free Article Link: Click for free!

During one of my recent assessments, I decided to take a closer look at how automated emails were being handled by the platform. While casually exploring the email flows, I stumbled upon yet another open redirect vulnerability — this time within the welcome email system itself.

While reviewing the behavior of these automated emails, I noticed a flaw that could let attackers redirect users to unintended websites. The issue lies in how download links are generated in welcome emails, allowing manipulation by anyone who sends a crafted request.

The endpoint responsible for sending welcome emails allows the sender to customize the URLs for downloading the app. Specifically, two parameters — androidUrl and iosUrl — can be controlled in a POST request. If a malicious actor replaces these URLs with links to external sites, users who receive the email will be redirected to unexpected locations.

https://api.target.com/marketing/send-welcome-email

POST /marketing/send-welcome-email HTTP/2…

文章来源: https://infosecwriteups.com/how-a-welcome-email-can-be-used-for-malicious-redirection-fd833ec71550?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh