$500 Bug Bounty:Open Redirection via OAuth on Shopify
文章描述了Shopify OAuth流程中发现的一个开放重定向漏洞:通过传递无效的scope参数,攻击者可将用户重定向至任意外部网站(包括钓鱼页面),尽管OAuth验证失败仍存在高风险。该漏洞被报告后获得500美元赏金。 2025-4-30 06:5:50 Author: infosecwriteups.com(查看原文) 阅读量:10 收藏

Monika sharma

How an Invalid Scope Parameter Let Me Redirect Users to Phishing Sites

In OAuth implementations, security often depends on strict validation of parameters like redirect_uri and scope.
In this real-world Shopify bug bounty report, I’ll walk you through how I discovered an Open Redirection vulnerability in Shopify OAuth flow — one that allowed attackers to redirect users to arbitrary external sites, including phishing pages, just by passing an invalid scope.

Let’s break it all down

Vulnerability Summary

  • Bug Type: Open Redirection via OAuth
  • Target: Shopify OAuth Authorization Flow
  • Impact: Redirect any user to malicious domains, even with OAuth validation failure
  • Severity: Medium → High (due to phishing potential)
  • Bounty Awarded: $500
  • Report ID: #55525
  • Hunter: coolboss

Step-by-Step Reproduction

Let’s see how this issue can be reproduced using a simple example.

  1. Create a Shopify App

First, the attacker creates a test app at prans.myshopify.com and obtains a client_id.


文章来源: https://infosecwriteups.com/500-bug-bounty-open-redirection-via-oauth-on-shopify-4159387482f9?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh