Today, I want to share my experience of discovering an account takeover (ATO) vulnerability through XSS and Open redirect. Let's dive right in!

So, hunting starts with a random program selection let call it example.xyz.It is a crypto platform.

I started hunting with enumerating subdomain and checking if there is any possible subdomain takeover but there is nothing found.

I use my Wayback URLs to grab previous URL's from the example.xyzand started hunting manually. I visited the signup page and started the registration process while registering on the site I notice a parameter called callbackUrl

https://example.xyz/sign-in?callbackUrl=

I decided to test this parameter with an open redirect payload.

https://example.xyz/sign-in?callbackUrl=https://example.xyz@evil.com

and this Open redirect works. After the signin. I was redirected to the evil.com. but this wasn't sufficient for higher impact the max could go up to P3 /P4 so I decide to test for a xss. I use many payloads but the tags <>were filter out from the payload. So, I decided to use different payload i.e

javascript:alert(document.cookie)

and this one worked successfully I was able to pop-up a alert with session cookies.

None

After this I prepared a report to submit to the program. and after few days I got a reply from the program manager.

None

The report considers as duplicate of a 2024 report submitted by someone else on the platform.

Thank you for reading if you enjoy it clap 50 times

New articles Dropping soon

Connect with me Linkedin: https://www.linkedin.com/in/jeet-pal-22601a290/ Instagram: https://www.instagram.com/jeetpal.2007/ X/Twitter: https://x.com/Mr_mars_hacker

And here's something special for you! ๐Ÿšจ

Join a community of 3,700+ security researchers on our Discord server, where we discuss Web3 vulnerabilities, audits, and much more! ๐Ÿš€ ๐Ÿ‘‰ Join the server here!: https://discord.gg/Y467qAFM4X