Hintru ENES ← Todos los labs

Avail.zone – Open Redirect / SSRF via website Parameter

EN easy bug bounty writeup Open RedirectSSRFparameter injectionURL manipulationphishingrecon

A phishing/spam email promotes a 'free partnership tool' at start.avail.zone. The invite URL passes a domain through a query parameter — what does the server actually do with it? Investigate the request flow and find an abuse path that could turn this 'invite' into something nastier.

0/5
resueltos
Paso 1 Paso 2 Paso 3 Paso 4 Paso 5
post_exploitation

Paso 5 · Document Impact & Write the PoC Report

Objetivo: Summarise the vulnerability chain, its real-world impact, and produce a concise proof-of-concept suitable for a bug bounty report.

Contexto: You now have enough information to assess severity and communicate the finding responsibly to the vendor.

Pistas progresivas

Revela solo las que necesites. Claude lleva la cuenta de cuántas usaste para calibrar la retroalimentación.

Pista 1 — empujón direccional

Think about who is harmed: the end users who receive these emails, the businesses whose domains are spoofed, and the platform itself. Map each attack scenario to a concrete impact.

Pista 2 — técnica / clase de vuln

Structure your report around: Vulnerability Type → Root Cause → Attack Scenario → PoC Steps → Impact → Remediation. For CVSS scoring, consider the network vector, no authentication required, and potential confidentiality impact.

Pista 3 — casi la solución

PoC one-liner for Open Redirect:
https://start.avail.zone/build-connections?website=https://attacker.com

Remediation suggestions:
1. Whitelist only bare domain names (no scheme/path) in the `website` parameter.
2. Never use the `website` value as a redirect target or in server-side HTTP requests without strict validation.
3. If server-side fetching is needed, use an allowlist and disable redirects in the HTTP client.

Tu intento