FirstBlood-#259CWE-601 Open Redirect on GET /drpanel/logout.php via ref param
This issue was discovered on FirstBlood v1

On 2021-05-15, jpdev Level 3 reported:


The ref= parameter on the logout.php page within the drpanel is vulnerable to an open redirect.




GET /drpanel/logout.php?ref=/\/ HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:88.0) Gecko/20100101 Firefox/88.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-GB,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Connection: close
Cookie: drps=1ef2ec2643929e919611d0031
Upgrade-Insecure-Requests: 1


A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks.

Additional Reading containing explanation and mitigiations

P4 Low

Endpoint: GET /drpanel/logout.php?

Parameter: ref=

Payload: /\/

FirstBlood ID: 1
Vulnerability Type: Open Redirect

There is an open url redirect vulnerability on /logout.php. The code expects it to start with / and does not allow to redirect to external domains but this can be bypassed.