Open redirect
What is it?
An Open Redirect Vulnerability allows an attacker to redirect a user to an arbitrary website of the attacker's choosing. It occurs when an application incorporates user-supplied data into a URL which causes a redirection to that URL. This can be used to facilitate phishing attacks, steal sensitive information, or perform other malicious activities.
A simple example
Consider a website that uses a URL parameter to redirect the user to a specified page. For example: http://website.com/redirect?site=http://some-site.com. An attacker could replace "http://some-site.com" with a malicious site, then trick a user into following the crafted link.
Open Redirects can lead to: Phishing attacks Disclosure of sensitive information Malware installation Execution of arbitrary scripts
Other learning resources: OWASP: https://owasp.org/www-community/attacks/Unvalidated_Redirects_and_Forwards PortSwigger: https://portswigger.net/web-security/unvalidated-redirects
Checklist
Exploitation
Craft an URL with redirection to a malicious site
Trick the user into clicking the link
Last updated