Published On: 29 Apr 2021
After logging in to your Instagram account from a web browser you will have the option to "Save Your Login Info" , this endpoint [ https://www.instagram.com/accounts/onetap/?next=/ ] was exposed to an Open redirect bug in the "next" parameter , this lead to Bypass linkshim protection.
This flaw can be used in phishing attacks to get users to visit malicious WebSites within the application.
Step
1
Once you logged into your instagram account from a web browser , you will get this URL
[ https://www.instagram.com/accounts/onetap/?next=/ ].
Step
2
Now we should construct the malicious URL , in the "next" parameter add [ https://:/// ] ( No matter how many / added after https://: ; e.g., https://:/ ) ; After [ https://:/// ] add the malicious website. TEST = ( https://:///www.evilzone.org/ ).
Step
3
Encode TEST as a URL so it will be like this [ https%3A%2F%2F%3A%2F%2F%2Fwww.evilzone.org%2F ] .
Step
4
Add TEST to the "next" parameter.
Result : [ https://www.instagram.com/accounts/onetap/?next=https%3A%2F%2F%3A%2F%2F%2Fwww.evilzone.org%2F ]
Go to this URL , and by pressing " Not Now ", or " Save Info " it will redirect to the desired site.
It will redirect to https://www.evilzone.org/ .