IBM’s Open Redirect: The Accidental Travel Agent in OAuth Flow
IBM Security Verify Access users, beware! Versions 10.0.0 to 10.0.8 are vulnerable to an open redirect during the OAuth flow. This flaw could lead users to a malicious site disguised as trustworthy, potentially spilling the beans on sensitive information. It’s a hacker’s dream plot twist, but don’t worry, IBM’s on the case!

Hot Take:
Hold on to your redirect buttons, folks! IBM Security Verify Access has more holes than Swiss cheese when it comes to redirecting users. This open redirect vulnerability is like a digital magician’s trick, making you believe you’re going to a trustworthy site while sneakily sending you into the clutches of a cyber crook. Just when you thought it was safe to click, here comes the ‘redirect rodeo’ to lasso your sensitive information. Yee-haw!
Key Points:
- An open redirect vulnerability in IBM Security Verify Access versions 10.0.0 to 10.0.8 can be exploited by attackers.
- Attackers can redirect users to malicious sites appearing to be legitimate, risking sensitive data exposure.
- The vulnerability was discovered during a penetration test and involves bypassing the OAuth flow’s redirect logic using RFC 3986.
- IBM has issued a security bulletin with solutions to address the flaw.
- Vulnerability was discovered by security researcher Giulio Garzia and disclosed by IBM in August 2024.