OPEN REDIRECT
this attack redirect a victim to an attacker-controlled site by abusing a legitimate application's redirection functionality. all the attacker has to do is specify a website under their control in a redirection URL of a legitimate website and pass this URL to the victim. this is possible when the legitimate application's redirection functionality does not perform any kind of validation regarding the websites to which the redirection points. this is extremely useful during the initial access phase since it can lead victims to attacker-controlled web pages through a page that they trust.
MITIGATION
to remediate open redirects, avoid using user-supplied URLs or validate them strictly. If user input is necessary, ensure the value is valid, appropriate, and authorized. Map destination inputs to values, not actual URLs, and use server-side code to translate them. Sanitize inputs with a list of trusted URLs or regex. Implement a Safe Redirect, requiring users to confirm the redirection through a notification page.
Last updated