Summary: I found open redirect at the MoPub login page, https://app.mopub.com/login?next=https://google.com. It also allows javascript URIs, leading to XSS.
Description: You can modify the "next" URL parameter to redirect to any website upon logging in on MoPub.
Here's a proof of concept using the URL javascript:alert("proof of concept"):
An attacker could use this for phishing, cookie jacking, etc. since it allows javascript URIs and therefore XSS vectors. Additionally, they could use URL encoding to hide the URL that the victim is being redirected to.
Thank you for your report @jack898,
We were able to reproduce the behavior you described and will get back to you when we have more information.
Thank you for thinking of Twitter security.
Thank you for your report. We believe it may be a valid security issue and will investigate it further. It could take some time to find and update the root cause for an issue, so we thank you for your patience.
Thank you for helping keep Twitter secure!
Thanks for the bounty! Will do.
We consider this issue to be fixed now. Can you please confirm?
Thank you for helping keep Twitter secure!
I can confirm it's fixed? Mind if I disclose this?