9. Open Redirect
Last updated
Last updated
An open redirect vulnerability occurs when a web application or server uses unvalidated, user-supplied input to redirect users to other sites. This can allow an attacker to craft a link to the vulnerable site which redirects to a malicious site of their choosing. Attackers can leverage this vulnerability in phishing campaigns, session theft, or forcing a user to perform an action without their consent.
Open redirect bypasses
Simply try to change the domain:
Bypass the filter when protocol is blacklisted using //
Bypass the filter when double slash is blacklisted using \\
Bypass the filter when double slash is blacklisted using http: or https:
Bypass the filter using %40
Bypass the filter if it only checks for domain name
Bypass the filter if it only checks for domain name using a dot %2e
Bypass the filter if it only checks for domain name using a query/question mark ?
Bypass the filter if it only checks for domain name using a hash %23
Bypass the filter using a symbol
Bypass the filter using a url encoded Chinese dot %E3%80%82
Bypass the filter if it only allows you to control the path using a nullbyte %0d or %0a