Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Sun, 3 Mar 2019 17:31:17 +0100
From: Hanno Böck <hanno@...eck.de>
To: oss-security@...ts.openwall.com
Subject: Open Redirect in Tiny Tiny RSS (tt-rss)

Hi,

Via my personal Bug Bounty program on hackerone I got a report about an
open redirect in a publicly accessible instance of Tiny Tiny RSS I have
running on a subdomain.

I'm aware that whether open redirects are vulnerabilities is debatable
(which is also reflected in the discussion with tt-rss, but they fixed
it nevertheless).

PoC:
https://[hostname]/public.php?return=http%3a%2f%2fevil.com%2f&op=login&login=password=&profile=0

Report to tt-rss developers:
https://discourse.tt-rss.org/t/open-redirect-via-public-php/2077
Fix:
https://git.tt-rss.org/fox/tt-rss/commit/c68ac04020d85a296c784de18f8def3f365f9f6a

This was reported by Mariia Aleksandrova (zophi), I just forwarded the
report to the tt-rss developers.

-- 
Hanno Böck
https://hboeck.de/

mail/jabber: hanno@...eck.de
GPG: FE73757FA60E4E21B937579FA5880072BBB51E42

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.