BugUnstuck

Trusted extra eyes for stuck bug bounty findings

Live Signal
← Back to feed
Auth BypassBugcrowdBugcrowdoauthredirecttoken-theftbankingauth-flowOPEN

OAuth redirect chain — potential token interception via open redirect in callback flow

During authenticated testing of a banking app, I found that the OAuth callback flow has a redirect parameter that accepts partially validated URLs. While fully external domains are blocked, I found that certain URL patterns using path traversal or subdomain tricks can redirect the callback to an attacker-controlled location, potentially leaking the OAuth authorization code or token fragment. The flow requires user interaction (clicking a crafted link) but the redirect happens after authentication. Need help crafting a reliable PoC that bypasses the current validation and demonstrating token interception.

Focus area: Crafting a redirect bypass PoC that survives the partial URL validation.
by s3nt1n3l2/8/2026Confidence: 55/10090 views1 interested