Open Redirect Vulnerability
Open Redirect:
An open redirect is a type of web vulnerability where a website has a parameter that can redirect a user to an external URL without proper validation. This can be exploited by attackers to redirect users to malicious sites, phishing pages, or unwanted content.
Risks of Open Redirects:
- Phishing Attacks: Attackers can use open redirects to craft convincing phishing URLs that appear to come from a trusted site.
- Malware Distribution: Users can be redirected to sites that host malware, increasing the risk of infections.
- Loss of Trust: Users may lose trust in a website that unknowingly redirects them to malicious or unwanted content.
Payloads:
Example: https://cyberguardian40.blogspot.com/redirect?url=https://www.google.com
?url=http://{target}
?url=$2f%2f{target}
?next=http://{target}
/redirect/{target}
?view=/{target}
/login?to={target}
?next=http://{target}
/redirect/{target}
?view=/{target}
/login?to={target}
Remediation:
- Remove the redirection function from the application, and replace links to it with direct links to the relevant target URLs.
- Maintain a server-side list of all URLs that are permitted for redirection. Instead of passing the target URL as a parameter to the redirector, pass an index into this list.
Comments
Post a Comment