$500 Bug Bounty:Open Redirection via OAuth on Shopify
文章描述了Shopify OAuth流程中的一个开放重定向漏洞。攻击者通过传递无效的scope参数,可将用户重定向至任意外部网站(包括钓鱼页面)。该漏洞利用了OAuth参数验证不足的问题,导致用户被引导至恶意域名。漏洞被评为中等到高危级别,并获得500美元赏金。 2025-4-30 06:5:50 Author: infosecwriteups.com(查看原文) 阅读量:8 收藏

Monika sharma

How an Invalid Scope Parameter Let Me Redirect Users to Phishing Sites

In OAuth implementations, security often depends on strict validation of parameters like redirect_uri and scope.
In this real-world Shopify bug bounty report, I’ll walk you through how I discovered an Open Redirection vulnerability in Shopify OAuth flow — one that allowed attackers to redirect users to arbitrary external sites, including phishing pages, just by passing an invalid scope.

Let’s break it all down

Vulnerability Summary

  • Bug Type: Open Redirection via OAuth
  • Target: Shopify OAuth Authorization Flow
  • Impact: Redirect any user to malicious domains, even with OAuth validation failure
  • Severity: Medium → High (due to phishing potential)
  • Bounty Awarded: $500
  • Report ID: #55525
  • Hunter: coolboss

Step-by-Step Reproduction

Let’s see how this issue can be reproduced using a simple example.

  1. Create a Shopify App

First, the attacker creates a test app at prans.myshopify.com and obtains a client_id.


文章来源: https://infosecwriteups.com/500-bug-bounty-open-redirection-via-oauth-on-shopify-4159387482f9?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh