exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Twitter Open Redirection

Twitter Open Redirection
Posted Aug 5, 2010
Authored by N. Grisolia | Site bonsai-sec.com

Twitter suffers from an open redirection vulnerability.

tags | advisory
SHA-256 | 5507adcb3c469e7dd89849210b860d50b91f1043e843eb041746613c38584b74

Twitter Open Redirection

Change Mirror Download
Twitter Open Redirection Vulnerability

1. Advisory Information
Advisory ID: BONSAI-2010-0108
Date published: Tue Aug 3, 2010
Vendors contacted: Twitter
Release mode: Coordinated release

2. Vulnerability Information
Class: Unvalidated Redirects and Forwards
Remotely Exploitable: Yes
Locally Exploitable: Yes

3. Software Description
Twitter is a rich source of instant information. Stay updated. Keep
others updated. It's a whole thing.

4. Vulnerability Description
An open redirect is an application that takes a parameter and redirects
a user to the parameter value without any validation. This vulnerability
is used in phishing attacks to get users to visit malicious sites
without realizing it.

5. Vulnerable packages
Twitter < Mon Aug 2, 2010

6. Non-vulnerable packages
Twitter >= Mon Aug 2, 2010

7. Credits
This vulnerability was discovered by Nahuel Grisolia ( nahuel at
bonsai-sec.com ).

8. Technical Description
Twitter was prone to an open redirection vulnerability because the
software failed to adequately sanitize user-supplied input.
The following proof of concept is given:
Without having a valid twitter session browse to:

https://twitter.com/login?redirect_after_login=http://www.bonsai-sec.com

After a successful login, the user will be forwarded to
http://www.bonsai-sec.com

9. Report Timeline
* 2010-07-01 / Vulnerability was identified
* 2010-07-06 / First answer from Twitter.
* 2010-07-06 to 2010-08-02 / Multiple emails from Bonsai Research Team.
No answer was given.
* 2010-08-02 / Twitter sent us an email stating that the vulnerability
was patched.
* 2010-08-03 / Public Disclosure.

10. About Bonsai
Bonsai is a company involved in providing professional computer
information security services. Currently a sound growth company, since
its foundation in early 2009 in Buenos Aires, Argentina, we are fully
committed to quality service, and focused on our customers real needs.

11. Disclaimer
The contents of this advisory are copyright (c) 2010 Bonsai Information
Security, and may be distributed freely provided that no fee is charged
for this distribution and proper credit is given.

12. Research
http://www.bonsai-sec.com/en/research/vulnerability.php

13. Blog Post
http://www.bonsai-sec.com/blog/index.php/twitter-open-redirection-vulnerability/
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close