Open redirect / phishing attack via "success_url" parameter in OpenStack
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
OpenStack Dashboard (Horizon) |
Fix Released
|
High
|
Vishal Manchanda | ||
OpenStack Security Advisory |
Incomplete
|
Undecided
|
Unassigned |
Bug Description
The "success_url" param is used when updating the project snapshot and it lacks sanitizing the input URL that allows an attacker to redirect the user to another website.
For instance, the URL below will redirect you to https:/
The attacker can send this link to the user and when they click on the "Update" button the request and response will look like this:
[+] Request
POST /project/
Host: xxx.com
Cookie: _ga_0CPB5J3KQB=
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0
Accept: text/html,
Accept-Language: en-US,en;q=0.5
<======
csrfmiddlewaret
[+] Response
HTTP/1.1 302 Found
date: Tue, 12 Jul 2022 10:14:38 GMT
server: Apache/2.4.41 (Ubuntu)
location: https:/
content-length: 0
x-horizon-location: https:/
x-frame-options: SAMEORIGIN
vary: Accept-
content-language: en
<======
Impact: The attacker can trick redirect users to the cloned website to steal information, a so-called Phishing Attack.
CWE-601: URL Redirection to Untrusted Site ('Open Redirect')
http://
I have tested it on OpenStack Xena so the Horizon dashboard could be between version 20.0.0 to 20.1.2. I haven't tested the bug on other versions.
Unfortunately, I have discovered this bug when pen-testing a black box project so I do not have the log file. Hope my information helps you to understand the bug.
description: | updated |
Since this report concerns a possible security risk, an incomplete
security advisory task has been added while the core security
reviewers for the affected project or projects confirm the bug and
discuss the scope of any vulnerability along with potential
solutions.