Execution After Redirect
An attack where an attacker ignores redirects and retrieves sensitive content intended for authenticated users
EAR
Execution After Redirect (EAR) is an attack where an attacker ignores redirects and retrieves sensitive content intended for authenticated users. A successful EAR exploit can lead to complete compromise of the application.
<?php if (!$loggedin) {
print "<script>window.location = '/login';</script>\n\n";
} ?>
<h1>Admin</h1>
<a href=/mu>Manage Users</a><br />
<a href=/ud>Update Database Settings</a>
This checks if the parameter loggedin
is true. If its not true it uses javascript to redirect to the login page. However by disabling javascript in the browser the same request is repeated without following the JavaScript redirect and the “Admin” section is accessible without authentication.
Example
Using the previse machine we will demonstrate the EAR vulnerbality. For this we are going to use Burp which can intercept responses.

Using this we visit 10.10.11.104/files.php en change the response from 302 to 200. And we get content back which us normally only for authenticated user.

Using Burps match/replace we can automatically change the 302's to a 200 code.

Using this we were able to reach the account page and create a user and a login.
Last updated
Was this helpful?