Open redirect

From OWASP
Revision as of 08:04, 16 February 2007 by Jandel (Talk | contribs)

Jump to: navigation, search

Contents

Overview

An open redirect is an application that takes a parameter and redirects a user to the parameter value without any validation. This vulnerability is used in phishing attacks to get users to visit malicious sites without realizing it.

This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.


Consequences

Phishing

Exposure period

Platform

All web platforms affected

Required resources

Severity

Likelihood of exploit

Avoidance and mitigation

To avoid the open redirect vulnerability parameters of the application script/program must be validated before sending 302 HTTP code (redirect) to the client browser.

The server must have a relation of the authorized redirections (i.e. in a database)

Discussion

Examples

http://www.vulnerable.com?redirect=http://www.attacker.com

Related problems