My Story with Onavo (a Facebook's Acquisition)

- 1 min

When I was checking Facebook WhiteHat page, I realized that they added a new target on the scope, which is Onavo.

I downloaded their apps and started to intercept the links that I found.

One of the links raised an eye-brow. I said to myself that this looks vulnerable.

The link looks something like this:

So it looks like it is vulnerable to Open Redirect.

I executed the link this:

It redirected me to

Right now I have an Open Redirect vulnerability, but that’s not enough for me.

After digging up more on the nature of the page, I realized that it redirects me after about 2 seconds. So it looked something like this:

<meta http-equiv="refresh" content="0; url=" />

So I changed it to issue a redirection to

Reflected XSS



Final Thoughts:

Mazin Ahmed

Mazin Ahmed

Thoughts of a hacker

rss facebook twitter github gitlab youtube mail spotify lastfm instagram linkedin google google-plus pinterest medium vimeo stackoverflow reddit quora quora