<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jandel</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jandel"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Jandel"/>
		<updated>2026-04-23T20:51:05Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:SQL_Injection&amp;diff=16529</id>
		<title>Talk:SQL Injection</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:SQL_Injection&amp;diff=16529"/>
				<updated>2007-02-19T07:52:47Z</updated>
		
		<summary type="html">&lt;p&gt;Jandel: New page: Maybe this article must be in Code injection category?&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Maybe this article must be in Code injection category?&lt;/div&gt;</summary>
		<author><name>Jandel</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Open_redirect&amp;diff=16496</id>
		<title>Open redirect</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Open_redirect&amp;diff=16496"/>
				<updated>2007-02-16T13:08:49Z</updated>
		
		<summary type="html">&lt;p&gt;Jandel: /* Examples */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Overview==&lt;br /&gt;
&lt;br /&gt;
An open redirect is an application that takes a parameter and redirects a user to the parameter value without any validation. This vulnerability is used in phishing attacks to get users to visit malicious sites without realizing it.&lt;br /&gt;
&lt;br /&gt;
{{Template:Stub}}&lt;br /&gt;
&lt;br /&gt;
==Consequences ==&lt;br /&gt;
&lt;br /&gt;
[[Phishing]]&lt;br /&gt;
&lt;br /&gt;
==Exposure period ==&lt;br /&gt;
&lt;br /&gt;
==Platform ==&lt;br /&gt;
All web platforms affected&lt;br /&gt;
&lt;br /&gt;
==Required resources ==&lt;br /&gt;
&lt;br /&gt;
==Severity ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Likelihood of exploit ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Avoidance and mitigation ==&lt;br /&gt;
To avoid the open redirect vulnerability parameters of the application script/program must be validated before sending 302 HTTP code (redirect) to the client browser.&lt;br /&gt;
&lt;br /&gt;
The server must have a relation of the authorized redirections (i.e. in a database)&lt;br /&gt;
&lt;br /&gt;
==Discussion ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
&lt;br /&gt;
http://www.vulnerable.com?redirect=http://www.attacker.com&lt;br /&gt;
&lt;br /&gt;
The phishing use can be more complex, using complex encoding:&lt;br /&gt;
&lt;br /&gt;
Real redirect: http://www.vulnerable.com/redirect.asp?=http://www.links.com&lt;br /&gt;
&lt;br /&gt;
Facked link: http://www.vulnerable.com/security/advisory/23423487829/../../../redirect.asp%3F%3Dhttp%3A//www.facked.com/advisory/system_failure/password_recovery_system&lt;br /&gt;
&lt;br /&gt;
==Related problems ==&lt;br /&gt;
&lt;br /&gt;
* [[Open forward]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Vulnerability]]&lt;/div&gt;</summary>
		<author><name>Jandel</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Open_redirect&amp;diff=16495</id>
		<title>Open redirect</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Open_redirect&amp;diff=16495"/>
				<updated>2007-02-16T13:04:20Z</updated>
		
		<summary type="html">&lt;p&gt;Jandel: /* Platform */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Overview==&lt;br /&gt;
&lt;br /&gt;
An open redirect is an application that takes a parameter and redirects a user to the parameter value without any validation. This vulnerability is used in phishing attacks to get users to visit malicious sites without realizing it.&lt;br /&gt;
&lt;br /&gt;
{{Template:Stub}}&lt;br /&gt;
&lt;br /&gt;
==Consequences ==&lt;br /&gt;
&lt;br /&gt;
[[Phishing]]&lt;br /&gt;
&lt;br /&gt;
==Exposure period ==&lt;br /&gt;
&lt;br /&gt;
==Platform ==&lt;br /&gt;
All web platforms affected&lt;br /&gt;
&lt;br /&gt;
==Required resources ==&lt;br /&gt;
&lt;br /&gt;
==Severity ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Likelihood of exploit ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Avoidance and mitigation ==&lt;br /&gt;
To avoid the open redirect vulnerability parameters of the application script/program must be validated before sending 302 HTTP code (redirect) to the client browser.&lt;br /&gt;
&lt;br /&gt;
The server must have a relation of the authorized redirections (i.e. in a database)&lt;br /&gt;
&lt;br /&gt;
==Discussion ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
&lt;br /&gt;
http://www.vulnerable.com?redirect=http://www.attacker.com&lt;br /&gt;
&lt;br /&gt;
==Related problems ==&lt;br /&gt;
&lt;br /&gt;
* [[Open forward]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Vulnerability]]&lt;/div&gt;</summary>
		<author><name>Jandel</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Open_redirect&amp;diff=16494</id>
		<title>Open redirect</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Open_redirect&amp;diff=16494"/>
				<updated>2007-02-16T13:04:08Z</updated>
		
		<summary type="html">&lt;p&gt;Jandel: /* Platform */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Overview==&lt;br /&gt;
&lt;br /&gt;
An open redirect is an application that takes a parameter and redirects a user to the parameter value without any validation. This vulnerability is used in phishing attacks to get users to visit malicious sites without realizing it.&lt;br /&gt;
&lt;br /&gt;
{{Template:Stub}}&lt;br /&gt;
&lt;br /&gt;
==Consequences ==&lt;br /&gt;
&lt;br /&gt;
[[Phishing]]&lt;br /&gt;
&lt;br /&gt;
==Exposure period ==&lt;br /&gt;
&lt;br /&gt;
==Platform ==&lt;br /&gt;
All web plattforms affected&lt;br /&gt;
&lt;br /&gt;
==Required resources ==&lt;br /&gt;
&lt;br /&gt;
==Severity ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Likelihood of exploit ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Avoidance and mitigation ==&lt;br /&gt;
To avoid the open redirect vulnerability parameters of the application script/program must be validated before sending 302 HTTP code (redirect) to the client browser.&lt;br /&gt;
&lt;br /&gt;
The server must have a relation of the authorized redirections (i.e. in a database)&lt;br /&gt;
&lt;br /&gt;
==Discussion ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
&lt;br /&gt;
http://www.vulnerable.com?redirect=http://www.attacker.com&lt;br /&gt;
&lt;br /&gt;
==Related problems ==&lt;br /&gt;
&lt;br /&gt;
* [[Open forward]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Vulnerability]]&lt;/div&gt;</summary>
		<author><name>Jandel</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Open_redirect&amp;diff=16493</id>
		<title>Open redirect</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Open_redirect&amp;diff=16493"/>
				<updated>2007-02-16T13:03:00Z</updated>
		
		<summary type="html">&lt;p&gt;Jandel: /* Avoidance and mitigation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Overview==&lt;br /&gt;
&lt;br /&gt;
An open redirect is an application that takes a parameter and redirects a user to the parameter value without any validation. This vulnerability is used in phishing attacks to get users to visit malicious sites without realizing it.&lt;br /&gt;
&lt;br /&gt;
{{Template:Stub}}&lt;br /&gt;
&lt;br /&gt;
==Consequences ==&lt;br /&gt;
&lt;br /&gt;
[[Phishing]]&lt;br /&gt;
&lt;br /&gt;
==Exposure period ==&lt;br /&gt;
&lt;br /&gt;
==Platform ==&lt;br /&gt;
&lt;br /&gt;
==Required resources ==&lt;br /&gt;
&lt;br /&gt;
==Severity ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Likelihood of exploit ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Avoidance and mitigation ==&lt;br /&gt;
To avoid the open redirect vulnerability parameters of the application script/program must be validated before sending 302 HTTP code (redirect) to the client browser.&lt;br /&gt;
&lt;br /&gt;
The server must have a relation of the authorized redirections (i.e. in a database)&lt;br /&gt;
&lt;br /&gt;
==Discussion ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
&lt;br /&gt;
http://www.vulnerable.com?redirect=http://www.attacker.com&lt;br /&gt;
&lt;br /&gt;
==Related problems ==&lt;br /&gt;
&lt;br /&gt;
* [[Open forward]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Vulnerability]]&lt;/div&gt;</summary>
		<author><name>Jandel</name></author>	</entry>

	</feed>