Open Redirect at Nvidia

Mohamed Abdelhady
1 min readAug 16, 2022

--

Hi everyone , I’m Mohamed Abdelhady.

At first I gonna explain What Open Redirect is ?

So, we already should know what Open redirect is. For someone who doesn’t it is when remote attacker can set arbitrary value as a redirect destination.

https://domain.com/any_endpoint?redirectUrl=https://app.domain.com

Which in the end leads to app.domain.com. But what if someone malforms this URL into the following:

https://domain.com/any_endpoint?redirectUrl=https://evil.com

That will redirect to evil.com .

The Nvidia bug is similar to the previous

https://subdomain.nvidia.com/PATH?vuln-paramter=https://subdomain.nvidia.com/

At first I found a URL parameter redirect to anther nvidia subdomain. So I tried to change the subdomain to xthemo.com and it worked . Then I tried to check if I can escalate it to

https://subdomain.nvidia.com/PATH?vuln-paramter=https://xthemo.com/

1-SSRF

I put my burp collaborator and clicked pull now button if the response was 200 than would be SSRF but unfortunately I found the response was 302 then means the nvidia website just redirect

https://subdomain.nvidia.com/PATH?vuln-paramter=https://burp-collaborator.net

2-XSS

I tried to inject XSS payload like javascript:alert() and it’s bypasses but it didn’t work

https://subdomain.nvidia.com/PATH?vuln-paramter=javascript:alert()

3-LFI

I tried to read internal files like hosts file using ?vuln-URL=C:/WINDOWS/System32/drivers/etc/hosts and LFI word list but unfortunately it didn’t get any content

https://subdomain.nvidia.com/PATH?vuln-paramter=C:/WINDOWS/System32/drivers/etc/hosts

--

--

Responses (2)