Open Redirect Vulnerability

Open Redirect:

   An open redirect is a type of web vulnerability where a website has a parameter that can redirect a user to an external URL without proper validation. This can be exploited by attackers to redirect users to malicious sites, phishing pages, or unwanted content.



Risks of Open Redirects:

  • Phishing Attacks: Attackers can use open redirects to craft convincing phishing URLs that appear to come from a trusted site.
  • Malware Distribution: Users can be redirected to sites that host malware, increasing the risk of infections.
  • Loss of Trust: Users may lose trust in a website that unknowingly redirects them to malicious or unwanted content.

Payloads:

Example: https://cyberguardian40.blogspot.com/redirect?url=https://www.google.com

?url=http://{target}
?url=$2f%2f{target}
?next=http://{target}
/redirect/{target}
?view=/{target}
/login?to={target}

Remediation:

  • Remove the redirection function from the application, and replace links to it with direct links to the relevant target URLs.
  • Maintain a server-side list of all URLs that are permitted for redirection. Instead of passing the target URL as a parameter to the redirector, pass an index into this list.

Comments

Popular posts from this blog

Steps to fix the broken base repo in CentOS 7

What is Clickjacking