[Tutorial] An Access Control Vulnerability (Redirection)

Prince

[ Verified Seller ]
Staff member
Trusted Seller
Joined
11 yrs. 6 mth. 27 days
Messages
5,381
Reaction score
18,380
Age
45
Wallet
11,590$
The Vulnerability:

To restrict access to a specific page or file on the website, the page is returned completely to anyone who requests it but with a "302 Moved Temporarily" status and a Location header specifying an address to redirect to for unauthorized users or guests. The browser, being a good boy, immidietly follows the redirection to the location specified in the Location header before loading the contents of the page.

How to exploit it:

To let the browser load the contents of the page, we just need to intercept the response of the server and remove the Location header and voala!

- An example :
I will use burp suite .

First, we turn on intercept server response.
nMTqvUs.png

This is the response in burp proxy. You can see that the contents of the page are present in this response.
4bI930z.png

We remove the location header and forward the response to the browser.
VuUpSbq.png

The page is loaded in your browser! In this example, the page is a file management system.
mmKLDrL.png
 
Paid adv. expire in 2 months
CLICK to buy Advertisement !
westernunion carding Verified & Trusted WesternUnion | MoneyGram | Bank - Transferring [299$ BTC for 2000$ WU]
electronics carding Verified & Trusted Electronics Carding, Carding iPhone, Samsung Carding, MacBook Carding, Laptops Carding
Top Bottom