Hintru ENES ← All labs

Avail.zone – Open Redirect / SSRF via website Parameter

EN easy bug bounty writeup Open RedirectSSRFparameter injectionURL manipulationphishingrecon

A phishing/spam email promotes a 'free partnership tool' at start.avail.zone. The invite URL passes a domain through a query parameter — what does the server actually do with it? Investigate the request flow and find an abuse path that could turn this 'invite' into something nastier.

0/5
solved
Step 1 Step 2 Step 3 Step 4 Step 5
post_exploitation

Step 5 · Document Impact & Write the PoC Report

Objective: Summarise the vulnerability chain, its real-world impact, and produce a concise proof-of-concept suitable for a bug bounty report.

Context: You now have enough information to assess severity and communicate the finding responsibly to the vendor.

Progressive hints

Only reveal the ones you need. Claude tracks how many you used to calibrate the feedback.

Hint 1 — directional nudge

Think about who is harmed: the end users who receive these emails, the businesses whose domains are spoofed, and the platform itself. Map each attack scenario to a concrete impact.

Hint 2 — technique / vuln class

Structure your report around: Vulnerability Type → Root Cause → Attack Scenario → PoC Steps → Impact → Remediation. For CVSS scoring, consider the network vector, no authentication required, and potential confidentiality impact.

Hint 3 — near solution

PoC one-liner for Open Redirect:
https://start.avail.zone/build-connections?website=https://attacker.com

Remediation suggestions:
1. Whitelist only bare domain names (no scheme/path) in the `website` parameter.
2. Never use the `website` value as a redirect target or in server-side HTTP requests without strict validation.
3. If server-side fetching is needed, use an allowlist and disable redirects in the HTTP client.

Your attempt