31 lines
1.3 KiB
Plaintext
31 lines
1.3 KiB
Plaintext
=== What is the potential impact?
|
|
|
|
If an attacker tricks a user into opening a link of his choice, the user is
|
|
redirected to a domain controlled by the attacker.
|
|
|
|
From then on, the attacker can perform various malicious actions, some more
|
|
impactful than others.
|
|
|
|
Below are some real-world scenarios that illustrate some impacts of an attacker
|
|
exploiting the vulnerability.
|
|
|
|
==== Domain Mirroring
|
|
|
|
A malicious link redirects to an attacker's controlled website mirroring the
|
|
interface of a web application trusted by the user. Due to the similarity in
|
|
the application appearance and the apparently trustable clicked hyperlink, the
|
|
user struggles to identify that they are browsing on a malicious domain. +
|
|
|
|
Depending on the attacker's purpose, the malicious website can leak
|
|
credentials, bypass Multi-Factor Authentication (MFA), and reach any
|
|
authenticated data or action.
|
|
|
|
==== Malware Distribution
|
|
|
|
A malicious link redirects to an attacker's controlled website that serves
|
|
malware. On the same basis as the domain mirroring exploitation, the attacker
|
|
develops a spearphishing or phishing campaign with a carefully crafted pretext
|
|
that would result in the download and potential execution of a hosted malicious
|
|
file. +
|
|
The worst-case scenario could result in complete system compromise.
|