Lucene search

K
hackeroneLauritzH1:2515808
HistoryMay 22, 2024 - 2:45 p.m.

Tools for Humanity: [Meetup][World ID][OIDC] Insufficient Filtering of "state" Parameter in Response Mode form_post leads to XSS and ATO

2024-05-2214:45:33
lauritz
hackerone.com
11
meetup
world id
oidc
xss
ato
content security policy
hackerone
html
access tokens
button injection

6.2 Medium

AI Score

Confidence

High

A lack of proper validation in the state parameter of the World ID OIDC authentication logic allowed the injection of HTML characters into the response body when using form_post as the OIDC response mode. This vulnerability could enable attackers to obtain access tokens from targeted users with minimal user interaction. Additionally, an XSS vulnerability was identified in the same parameter but was mitigated by our Content Security Policy (CSP).

The researcher was able to demonstrate this vulnerability by injecting a button that, when clicked, would direct users to an attacker-controlled site. Since the access token is included in the form HTML, clicking the button would include it in the request, exposing the user’s access token.

A bounty of $7,000 was awarded as part of a HackerOne event.

A blog post about this report including technical details can be found here: https://security.lauritz-holtmann.de/advisories/tfh-form_post-xss-ato/

I would like to especially thank Ian and Juan of Tools for Humanity for their continuous support throughout and after the meetup. 😊

Join your local H1 Community!

6.2 Medium

AI Score

Confidence

High