Date: Sun, 3 Mar 2019 16:58:48 +0000 From: Mark Steward <marksteward@...il.com> To: oss-security@...ts.openwall.com Subject: Re: Open Redirect in Tiny Tiny RSS (tt-rss) This fix isn't sufficient - there are URLs that browsers process that don't have a host when passed through parse_url. Mark On Sun, Mar 3, 2019 at 4:32 PM Hanno Böck <hanno@...eck.de> wrote: > > Hi, > > Via my personal Bug Bounty program on hackerone I got a report about an > open redirect in a publicly accessible instance of Tiny Tiny RSS I have > running on a subdomain. > > I'm aware that whether open redirects are vulnerabilities is debatable > (which is also reflected in the discussion with tt-rss, but they fixed > it nevertheless). > > PoC: > https://[hostname]/public.php?return=http%3a%2f%2fevil.com%2f&op=login&login=password=&profile=0 > > Report to tt-rss developers: > https://discourse.tt-rss.org/t/open-redirect-via-public-php/2077 > Fix: > https://git.tt-rss.org/fox/tt-rss/commit/c68ac04020d85a296c784de18f8def3f365f9f6a > > This was reported by Mariia Aleksandrova (zophi), I just forwarded the > report to the tt-rss developers. > > -- > Hanno Böck > https://hboeck.de/ > > mail/jabber: hanno@...eck.de > GPG: FE73757FA60E4E21B937579FA5880072BBB51E42
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.