What is Open Redirect?

An open redirect is a security flaw in an application or a web page that causes URLs to fail to authenticate properly. The open redirect is a failure in this phase that allows attackers to direct users to malicious websites of third parties.

 

When and Where Happens?

Open redirection happens when, via a user-controlled input, a web page is redirected to another URL in another domain. This happens when the program takes user-controlled data to the target of redirection in an unsafe way.

 

Common dorks for open redirect

Some dorks

/{payload}

?next=

?url=

?target=

?rurl=

?dest=

?destination=

?redir=

redirect_uri=

?redirect_url=

?redirect=

/redirect/

 

Finding possible parameters using web archive for open redirection.

Using the below link user can identify maximum parameters that could be tested for open redirection.

https://web.archive.org/cdx/search/cdx?url=*.testphp.vulnweb.com/*&output=text&fl=original&collapse=urlkey

 

Automation is possible for checking for open redirect.

Use the following one Liner to test for open redirect.

 

gau testphp.vulnweb.com | tee -a archive 1>/dev/null && gf redirect archive | cut -f 3- -d ‘:’ | qsreplace “https://evil.com” | httpx -silent -status-code -location

 

Below are the GitHub links to the tools.

 

SSRF via open redirection.

 

This is vulnerable Lab made by Portswigger to test open redirection via ssrf.

  1. Access the lab and capture the request in Burp suite.

Fig 1.1 Check stock api Request

  1. Capture check stock request and send the request to repeater.

Fig-1.2 Next product intercept request

  1. Click on next product and send it to the repeater.

Fig-1.3 Tampering stock apiurl

  1. Change the stock api endpoint to /product/nextproduct?path=http://192.168.0.12:8080/admin

Fig -1.4 Rendering the request in Burp

  1. Render the request in the browser. In order to solve the lab, delete Carlos user.

Fig-1.5 Adding delete username endpoint in order to delete carlos user

  1. Add the endpoint to stock api as delete/username=carlos

Fig-1.6 Lab Solved Successfully

 

How Can You Prevent Open Redirection Vulnerabilities?

Not allowing the user to control where your page redirects them to will be the simplest and most efficient way to avoid insecure open Redirects. If you want to redirect the user based on URLs, you can always use an ID that is internally resolved to the respective URL instead of using untrusted input. You can use a redirection page that needs redirection if you want the user to be able to issue redirects.

 

Author,

Saketh Reddy Malepu

Attack & Pentest Team

Varutra Consulting Pvt. Ltd.

kalpblogger

View Comments

  • Hola! I've been reading your web site for a while now and finally got the courage to go
    ahead and give you a shout out from Dallas Tx! Just wanted to mention keep upp thhe excellent job!

    My page: hip hop-stil (moviedailynews.com)

  • This piece of writing will help the internet people for creating new website or even a blog from start to end.

Recent Posts

The Benefits of SEBI Security Audit and Governance: Safeguarding Investors’ Interests

Introduction In an increasingly interconnected world, the financial industry is becoming more vulnerable to cyber…

2 years ago

Root Detection Bypass Vulnerabilities: A Crucial Aspect of Mobile App Security

Introduction In today's interconnected world, where smartphones are an extension of our lives, ensuring the…

2 years ago

How to Detect & Mitigate Zero-Day Threats in Your Business Infrastructure?

Introduction Unseen and unpredictable, zero-day threats loom as a constant menace to modern businesses. Detecting…

2 years ago

Common Challenges In Android Penetration Testing

Android penetration testing is a crucial aspect of ensuring the security of Android applications and…

2 years ago

Password Spraying Attacks: Detecting and Preventing Credential-Based Threats

In today's interconnected world, where cybersecurity is of paramount importance, password security plays a crucial…

2 years ago

Bug Bounty vs. Penetration Testing: Which One Is Right for You?

Introduction to Web & Mobile Application Security Assessment Web and Mobile applications have become an…

2 years ago