This is one of the easiest bug that I have found in a private bugbounty program.
The program had two of it’s browsers in it’s scope. I was testing for RTLO related bugs,I found that the downloads section of the browser was rendering the rtlo characters in the improper way.
RTLO characters are “Right-To-Left-Override” characters which is rendered from right to left ,unlike English which is rendered from left to right.
I made a quick POC,
<html>
<head><title></title></head>
<body>
<a href="Link_TO_File_With_RTLO" download>apk rendered as txt file in browser downloads click here</a>
</body>
</html>
I named a file as textfile%E2%80%AEtxt.apk, which is a apk.But when downloaded in those two browser was rendered as textfilekpa.txt due to the improper handling of RTLO characters.
IMPACT: Victim downloads a file thinking it’s text file but ends up installing malicious apk.
The bug was fixed quickly in a month and a new release was rolled out ,The private program also acknowledged me in their HOF and rewarded a small amount.
References to similar bugs:
Illegal Rendered at Download Feature in Opera Mini that Lead to Extension Manipulation (with RTLO)
HackerOne disclosed on HackerOne: Domain spoofing in redirect page
Snapchat disclosed on HackerOne: RTLO char allowed in chat
Liked my article ? Follow me on LinkedIn, Twitter (@jayateerthaG), and Medium for more content about bugbounty, Infosec, cybersecurity and hacking.
Written on December 17, 2020 by Jayateertha Guruprasad.
Originally published on Medium