🚨 WARNING: A 0day vulnerability in Adobe Acrobat Reader is being actively exploited in the wild for 4 months now.
Simply opening a malicious PDF can lead to data theft and potentially full system compromise.
Adobe has not released a patch for this vulnerability.
@cyberx00t Next, I generated a token using the OAuth code, and the generated token was an Amazon Cognito JWT. Using any regular user's Amazon Cognito token, I could access resources in any company system that user had access to.
A simple open redirect can wreak havoc.
Simple open redirect -> misconfigured OAuth authentication flow -> privilege abuse using Amazon Cognito token
#bugbounty#bugcrowd
@cyberx00t The application had a centralized API login using OAuth, and one of the domains had an open redirect vulnerability. It was possible to inject into the redirect_uri that returns the OAuth code to the application, allowing me to capture it.