This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Open redirect"
From OWASP
(→Platform) |
(→Platform) |
||
Line 12: | Line 12: | ||
==Platform == | ==Platform == | ||
− | All web | + | All web platforms affected |
==Required resources == | ==Required resources == |
Revision as of 13:04, 16 February 2007
Overview
An open redirect is an application that takes a parameter and redirects a user to the parameter value without any validation. This vulnerability is used in phishing attacks to get users to visit malicious sites without realizing it.
This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.
Consequences
Exposure period
Platform
All web platforms affected
Required resources
Severity
Likelihood of exploit
Avoidance and mitigation
To avoid the open redirect vulnerability parameters of the application script/program must be validated before sending 302 HTTP code (redirect) to the client browser.
The server must have a relation of the authorized redirections (i.e. in a database)
Discussion
Examples
http://www.vulnerable.com?redirect=http://www.attacker.com