-
Notifications
You must be signed in to change notification settings - Fork 106
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Security issues Hostname spoofing & Open Redirect #206
Comments
I logged in but I can't read the report. |
@zidingz - just attaching you here for your reference. |
Hey @lpinca You should be able to have access to the report now. Let me know if issues persist ❤️ |
Yes, it works now. Thanks. I've also pinged Arnout (@3rd-Eden) on Twitter. |
I don't have access to the report either, but seems the same issue as reported previously on H1 about slash escaping. See SECURITY.md for ref. |
FML, that was my work account 😂 ANYWAYS, I can't access it on this account 😂 |
@3rd-Eden You should also have access now! |
@zidingz now I can no longer read the report :) Can we both have access or is it limited to only one maintainer? |
I still can't access it either. |
✅ Access is working here. |
@lpinca @3rd-Eden I have reported a security issue in huntr
https://www.huntr.dev/bounties/1625557993985-unshiftio/url-parse/
There are 2 attack scenarios possible for Open Redirect and Hostname Spoofing(Please take a look at the last comment)
Please validate and let us know your opinion on this. Thank you.
The text was updated successfully, but these errors were encountered: