Bigbasket Bug Bounty Writeup

This is the writeup about the Bigbasket Open redirect bypass vulnerability.

I tested Bigbasket portal for security loopholes and I picked the main domain as the target.

I fuzzed the domain with tools like wfuzz, ffuf, dirb and using Burp’s Content discovery.

While the fuzz was in progress, I noticed the next= parameter containing a URL, which means I can try Open Redirect / XSS / SSRF issues on this parameter.

I tried open redirection by replacing my domain.

I got Access Denied error which means there is a validation for the domain in the next= parameter.

So as next step I encoded my domain using online HTML encoder.

I URL encoded my domain using this Online tool.

Before URL encoding
After URL encoding

Now I used the URL encoded payload and inserted it on the next= parameter.

After I enter the credentials, and click Login – it redirects to my domain which is a successful Open redirect vulnerability 🎉

Below is the POC video.

POC Video :

💰 I’ve been rewarded by their Security team and acknowledged in their Hall of Fame.

Here’s the Hall of Fame.

Bigbasket Hall of Fame

That’s it in this write up.

Thank you!

You may like

Paypal Bug Bounty writeup

How I made to Paypal Bug Bounty $750

Hey Guys, This blog is all about how I made to PayPal Bounty $750 with simple bug as Open Redirect ...
Read More
BMW Bug Bounty Writeup

BMW Bug Bounty – Account Verification Bypass writeup

It all started with the BMW Security Experts Acknowledgment page, missing my name and I decided to give it a ...
Read More