About (about.com) Open Redirect Multiple (Dest Redirect Privilege Escalation) Security Vulnerabilities

About (about.com) Unvalidated Redirects and Forwards (Open Redirect) Security Vulnerabilities

 

Some “Open Redirect” vulnerabilities related to about.com are introduced. There may be large number of other Open Redirect Vulnerabilities not discovered. Since About.com are trusted by some the other websites. Those vulnerabilities can be used to do “Covert Redirect” to these websites.

 

 

(1) Domain Description:

http://www.about.com/

 

“For March 2014, 61,428,000 unique visitors were registered by comScore for About.com, making it the 16th-most-visited online property for that month.” (The New York Times)

“About.com, also known as The About Group (formerly About Inc.), is an Internet-based network of content that publishes articles and videos about various subjects on its “topic sites,” of which there are nearly 1,000. The website competes with other online resource sites and encyclopedias, including those of the Wikimedia Foundation” (Wikipedia)

“As of May 2013, About.com was receiving about 84 million unique monthly visitors.” (TechCrunch. AOL Inc.)

“According to About’s online media kit, nearly 1,000 “Experts” (freelance writers) contribute to the site by writing on various topics, including healthcare and travel.” (About.com)

 

 

(2) Basic of Open Redirect (Dest Redirect Privilege Escalation) Vulnerabilities

“An open redirect is an application that takes a parameter and redirects a user to the parameter value without any validation. This vulnerability is used in phishing attacks to get users to visit malicious sites without realizing it.” (OWASP)

Open redirect is listed in OWASP top 10. The general consensus of it is “avoiding such flaws is extremely important, as they are a favorite target of phishers trying to gain the user’s trust.”

 

 

(3) Vulnerabilities Details:

The vulnerabilities can be attacked without user login. Tests were performed on Microsoft IE (10.0.9200.16750) of Windows 8, Mozilla Firefox (34.0) & Google Chromium 39.0.2171.65-0 ubuntu0.14.04.1.1064 (64-bit) of Ubuntu (14.04),Apple Safari 6.1.6 of Mac OS X Lion 10.7.

Use one of webpages for the following tests. The webpage address is “http://securitypost.tumblr.com/“. Suppose that this webpage is malicious.

 

Slide1

 

 

 

Vulnerable URL 1:

http://www.about.com/snf.htm?u=http://www.instagram.com/facebook/craigslist

POC:

http://www.about.com/snf.htm?u=http://securitypost.tumblr.com/

 

 

 

Vulnerable URL 2:

http://clk.about.com/?zi=13/1tO&ity=boostOrg&o=0&eng=boost&zu=http://paypal.com/imgur/xinhuanet

POC:

http://clk.about.com/?zi=13/1tO&ity=boostOrg&o=0&eng=boost&zu=http://www.inzeed.com/netflix/stackoverflow

 

 

 

Vulnerable URL 3:

http://wzus1.index.about.com/r?t=v&d=im&u=http%3A%2F%2Ft.co%2fxvideos%2fsoso%2f%naver%2fkickass.so

POC:

http://wzus1.index.about.com/r?t=v&d=im&u=http://www.diebiyi.com/xhamster/diply/onclickads.net 

 

 

 

 

 

POC Video:
https://www.youtube.com/watch?v=8ZCUAJ44FsU&feature=youtu.be

 

Blog Details:
http://tetraph.com/security/open-redirect/about-about-com-open-redirect-multiple-dest-redirect-privilege-escalation-security-vulnerabilities/
http://securityrelated.blogspot.com/2015/02/about-aboutcom-unvalidated-redirects.html

 

 

 

 

Vulnerability Disclosure:
Those vulnerabilities were reported to About on Sunday, Oct 19, 2014. No one replied. Until now, they are still unpatched.

 

 

 

 

Vulnerability Discover:
Wang Jing, Division of Mathematical Sciences (MAS), School of Physical and Mathematical Sciences (SPMS), Nanyang Technological University (NTU), Singapore.
http://www.tatraph.com/wangjing

 

Wang Jing

Leave a Reply

Your email address will not be published. Required fields are marked *