9. Open Redirect

An open redirect vulnerability occurs when a web application or server uses unvalidated, user-supplied input to redirect users to other sites. This can allow an attacker to craft a link to the vulnerable site which redirects to a malicious site of their choosing. Attackers can leverage this vulnerability in phishing campaigns, session theft, or forcing a user to perform an action without their consent.

Open redirect bypasses

Simply try to change the domain:

Bypass the filter when protocol is blacklisted using //

Bypass the filter when double slash is blacklisted using \\

Bypass the filter when double slash is blacklisted using http: or https:

Bypass the filter using %40

Bypass the filter if it only checks for domain name

Bypass the filter if it only checks for domain name using a dot %2e

Bypass the filter if it only checks for domain name using a query/question mark ?

Bypass the filter if it only checks for domain name using a hash %23

Bypass the filter using a symbol

Bypass the filter using a url encoded Chinese dot %E3%80%82

Bypass the filter if it only allows you to control the path using a nullbyte %0d or %0a

Last updated