Free Article Link: Click for free!
Press enter or click to view image in full size
Hello readers, today I want to share a security issue I came across during testing. It’s about an Open Redirect vulnerability in a Single Sign-On (SSO) endpoint on target.com. Although open redirects may look harmless at first, when placed inside authentication or SSO flows, they can lead to serious problems like phishing and trust abuse.
An Open Redirect happens when a web application takes a user-supplied URL as input and redirects the user to that location without properly validating it.
For example, a link such as:
https://target.com/login?redirect=http://evil.com
If the application does not verify the redirect domain, a user can be sent to http://evil.com instead of a safe internal page. This can be abused by attackers to trick users into believing they are on the legitimate site, while actually landing on a malicious one.
While testing, I found that the following SSO endpoint on target.com was not validating the redirect URL:
https://target.com/api/sso/v2/sso/jwt?error_url=http://evil.com