Open Redirection

Open Redirection

ko-fi

You should be looking for open URL redirects in the following areas of your target:

  • Sign in & register pages

  • Sign out application route or API endpoint

  • Password resets (inspect the generated token link too as it may contain a redirect parameter)

  • Profile account page

  • Email verification links

  • Error pages

  • Any important action within the app that requires multiple steps

One-Liner

cat waybacks.txt | \ 
sed -E 's#(redirect=|url=|next=|return=|dest=|destination=|continue=|goto=|redirecturl=)[^&]*#\1https://evil.com#gI' | \
httpx -silent -mc 301,302,307,308 -location
echo "http://tesla.com" | waybackurls | httpx -silent -timeout 2 -threads 100 | gf redirect | anew

Payloads

Parameter Pollution

Creating folder as victim domain

Nuclei Template

https://github.com/coffinxp/priv8-Nuclei/blob/main/mass_48_open_redirect_check.yaml

XSS in Login Page

XSS in Login Page

Header Based Open Redir

DOM Based redirect - XSS

XSS

Cookie Stealing

URL Validation Bypass

OAuth - Open Redirection to Token Leak

Vulnerable endpoint:

Find a token in the URL - OAuth:

That access_token=XYZ123 was visible in the URL, which means it could be leaked via the Referer header if this page redirected the browser somewhere else.

Smuggle the Token via Referer

OAuth / Okta Misconfiguration

Tools

Go-recon - gr-openredirects:

Interesting Books

Interesting Books

Disclaimer: As an Amazon Associate, I earn from qualifying purchases. This helps support this GitBook project at no extra cost to you.

Support this Gitbook

I hope it helps you as much as it has helped me. If you can support me in any way, I would deeply appreciate it.

ko-fi

buymeacoffee

Resources

Last updated