Arul Kumar, a bug hunter from TamilNadu,India who recently got $12,500 as bounty from Facebook, has today shared how he managed to identify multiple open url redirection vulnerabilities in Facebook.
He identified three open url redirection vulnerabilities in the facebook's dialogs, it could be exploitable to all users who are signed into facebook.
At first, facebook team rejected his finding because it needs some user interaction- users should click ok button in order to redirect the target website.
However, Arul managed to bypass it and redirect to the target website without user interaction. The facebook team accepted the vulnerability after bypassing the user interaction and offered $1500 bounty.
The list of vulnerable URL:
He identified three open url redirection vulnerabilities in the facebook's dialogs, it could be exploitable to all users who are signed into facebook.
At first, facebook team rejected his finding because it needs some user interaction- users should click ok button in order to redirect the target website.
However, Arul managed to bypass it and redirect to the target website without user interaction. The facebook team accepted the vulnerability after bypassing the user interaction and offered $1500 bounty.
The list of vulnerable URL:
- https://m.facebook.com/dialog/send?next=htp://google.com&error_ok=arul
- https://m.facebook.com/dialog/pagetab?next=htp://google.com&error_ok=arul
- https://m.facebook.com/dialog/apprequests?next=htp://google.com &error_ok=arul