webPromedium
Lab 348 — Connectify — IDN Homograph OAuth Open Redirect
hackadvisor
Task: OAuth gateway platform with redirect_uri validation that checks protocol and TLD format but does not normalize Unicode characters. Solution: register OAuth app with IDN homograph redirect_uri (Cyrillic і U+0456 instead of Latin i), trick admin bot into authorizing, steal auth code from Authorization Log, exchange for token, access admin secrets.
$ ls tags/ techniques/
unicodenodejsexpressadmin_botpunycodeopen_redirectoauthidn_homographredirect_uri_bypassauthorization_code_theft
token_exchangeidn_homograph_attackoauth_redirect_uri_bypassauthorization_code_theftapi_secret_exfiltration
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Lab 173 — ConnectHub — OAuth Open Redirect via URL Userinfo Bypass— hackadvisor
- [web][Pro]Lab 35 — GateKeeper SSO — Open Redirect via Regex URI Validation— hackadvisor
- [web][Pro]DevRelay — Open Redirect in OAuth Authorization— hackadvisor
- [web][Pro]Lab 303 — DevGateway — Broken Access Control in Admin API— hackadvisor
- [web][Pro]Lab 273 — AuthForge — SSRF via OAuth Dynamic Client Registration— hackadvisor