My First Bug, Open redirect at Epic Games → $500 Bounty
Who am I?
Security Researcher at HackerOne. In 2022, I was in 60th place worldwide as per HackerOne leaderboard. Check out the result from this link. You may follow me on Twitter to get some tips on Bug Bounty. My Twitter Handle: https://twitter.com/bughuntar
Little Summary:
I heard about Bug Bounty in January 2022. After that, I started learning. But when I started practicing on the Vulnerable machine, It didn’t satisfy me. And so I started practicing on real websites. And unfortunately got a bypass at Epic Games during practicing. So logically I started Bug Bounty at April 2022.
What is the Bug?
This bug is called Open redirect. Though it was not directly vulnerable through Open redirect, I got a Bypass. Actually, during practicing when I knew what is Open redirect and how it works, I needed an open redirect link. And so I picked up a link from HackerOne which was an Epic Games domain. Then I started learning Open redirect bypass. But I was astonished when it works. I tried many payloads but it only works when I used four backslashes before the host link. The payload was: &redirectUrl=////evil.com
Valid Redirect Link
https://www.redacted.com/id/login?lang=en-US&noHostRedirect=true&redirectUrl=https%3A%2F%2Fstore.redacted.com%2F
Open redirect Link
https://www.redacted.com/id/login?lang=en-US&noHostRedirect=true&redirectUrl=////evil.com
Conclusion:
As it was my first bug, I was too happy and was reciting “Alhamdulillah”.
Feel free to reach out to me on Twitter, Facebook, or another platform: always my username is “@bughuntar”.