Open Redirect Vulnerability in Kanaries# Open Redirect Vulnerability in Kanaries
Vendor Homepage: https://kanaries.net/
Poc Video: https://drive.google.com/file/d/1kqfbmx1W6UgSs56gOLOsUFiGcvKrIyW9/view?usp=sharing
## Step-by-Step Exploitation Guide
### 1. Go to the Website
Navigate to the [Kanaries website](https://kanaries.net).
### 2. Initiate Login/Sign Up
- Click on the **"Log in / Sign up"** button on the homepage.
- This redirects you to:https://kanaries.net/access?redirect_path=https%3A%2F%2Fkanaries.net%2Fhome
### 3. Modify the Redirect Parameter
- Change the `redirect_path` parameter to a malicious site, such as:
https://kanaries.net/access?redirect_path=https%3A%2F%2Fbing.com
### 4. Trigger the Redirect
- Click on **"Login With GitHub"** or **"Login With Google"** to initiate the login process.
- Instead of being redirected back to the intended page (`kanaries.net`), you are redirected to `bing.com` (or any malicious URL specified in the `redirect_path` parameter).
# poc image

[4.0K] /data/pocs/553bbf209185f025545ffe3b1b0ab66158e651f6
└── [1020] README.md
0 directories, 1 file