This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Germany/Projekte/Top 10-2013-A10-Ungeprüfte Um- und Weiterleitungen
NOTE: THIS IS NOT THE LATEST VERSION. Please visit the OWASP Top 10 project page to find the latest edition.
← A9-Nutzung von Komponenten mit bekannten Schwachstellen | Nächste Schritte für Software-Entwickler → |
Anwendungs- spezifisch |
Ausnutzbarkeit DURCHSCHNITTLICH |
Verbreitung SELTEN |
Auffindbarkeit EINFACH |
Auswirkung MITTEL |
Application / Business Specific |
Consider anyone who can trick your users into submitting a request to your website. Any website or other HTML feed that your users use could do this. |
Attacker links to unvalidated redirect and tricks victims into clicking it. Victims are more likely to click on it, since the link is to a valid site. Attacker targets unsafe forward to bypass security checks. |
Applications frequently redirect users to other pages, or use internal forwards in a similar manner. Sometimes the target page is specified in an unvalidated parameter, allowing attackers to choose the destination page. Detecting unchecked redirects is easy. Look for redirects where you can set the full URL. Unchecked forwards are harder, because they target internal pages. |
Such redirects may attempt to install malware or trick victims into disclosing passwords or other sensitive information. Unsafe forwards may allow access control bypass. |
Consider the business value of retaining your users’ trust. What if they get owned by malware? What if attackers can access internal only functions |
Bin ich durch 'Ungeprüfte Um- und Weiterleitungen' verwundbar?
The best way to find out if an application has any unvalidated redirects or forwards is to:
|
Wie kann ich 'Ungeprüfte Um- und Weiterleitungen' verhindern?
Safe use of redirects and forwards can be done in a number of ways:
Avoiding such flaws is extremely important as they are a favorite target of phishers trying to gain the user’s trust. |
Mögliche Angriffsszenarien
Scenario #1: The application has a page called “redirect.jsp” which takes a single parameter named “url”. The attacker crafts a malicious URL that redirects users to a malicious site that performs phishing and installs malware.
http://www.example.com/redirect.jsp?url=evil.com
Scenario #2: The application uses forwards to route requests between different parts of the site. To facilitate this, some pages use a parameter to indicate where the user should be sent if a transaction is successful. In this case, the attacker crafts a URL that will pass the application’s access control check and then forwards the attacker to administrative functionality for which the attacker isn’t authorized.
http://www.example.com/boring.jsp?fwd=admin.jsp
|
Referenzen
OWASP
Andere
|
← A9-Nutzung von Komponenten mit bekannten Schwachstellen | Nächste Schritte für Software-Entwickler → |