POC详情: dcf756149b7f44b07ee141b8b372548a78bd3392

来源
关联漏洞
标题: N/A (CVE-2024-57609)
描述:Kanaries Inc Pygwalker 在 v.0.4.9.9 之前的版本中存在一个问题,允许远程攻击者通过登录重定向功能的 redirect_path 参数获取敏感信息并执行任意代码。
描述
Open Redirect Vulnerability in Kanaries
介绍
# Open Redirect Vulnerability in Kanaries
Vendor Homepage: https://kanaries.net/

Poc Video: https://drive.google.com/file/d/1kqfbmx1W6UgSs56gOLOsUFiGcvKrIyW9/view?usp=sharing


## Step-by-Step Exploitation Guide

### 1. Go to the Website
Navigate to the [Kanaries website](https://kanaries.net).

### 2. Initiate Login/Sign Up
- Click on the **"Log in / Sign up"** button on the homepage.
- This redirects you to:https://kanaries.net/access?redirect_path=https%3A%2F%2Fkanaries.net%2Fhome

  
### 3. Modify the Redirect Parameter
- Change the `redirect_path` parameter to a malicious site, such as:
https://kanaries.net/access?redirect_path=https%3A%2F%2Fbing.com

### 4. Trigger the Redirect
- Click on **"Login With GitHub"** or **"Login With Google"** to initiate the login process.
- Instead of being redirected back to the intended page (`kanaries.net`), you are redirected to `bing.com` (or any malicious URL specified in the `redirect_path` parameter).

  # poc image
 ![alt text](https://imgur.com/EIZ4Wq3.png)
文件快照

[4.0K] /data/pocs/dcf756149b7f44b07ee141b8b372548a78bd3392 └── [1020] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。