Difference between revisions of "Open redirect"
|(2 intermediate revisions by 2 users not shown)|
|Line 1:||Line 1:|
Latest revision as of 12:36, 16 March 2012
This is a Vulnerability. To view all vulnerabilities, please see the Vulnerability Category page.
Last revision (mm/dd/yy): 03/16/2012
An open redirect is an application that takes a parameter and redirects a user to the parameter value without any validation. This vulnerability is used in phishing attacks to get users to visit malicious sites without realizing it.
Platform All web platforms affected
The phishing use can be more complex, using complex encoding:
Real redirect: http://www.vulnerable.com/redirect.asp?=http://www.links.com
- To avoid the open redirect vulnerability, parameters of the application script/program must be validated before sending 302 HTTP code (redirect) to the client browser.
The server must have a relation of the authorized redirections (i.e. in a database).
Related Technical Impacts