Unsafe Redirect
Test name: Unsafe Redirect
Summary |
---|
An unvalidated redirect is a situation when your web application forces the user’s browser to open another external URL. Unvalidated redirects are possible if the web application uses a URL that is taken from untrusted input. By modifying the untrusted URL input to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials.
The following example shows what kind of URL an attacker can create to exploit this vulnerability:
http://www.your_web_site.com/redirect?url=http://dangerous_web_site.com
Impact |
---|
This vulnerability allows an attacker to bypass protection mechanisms, gain privileges or assume identity.
Location |
---|
- The issue can be found in the source code on the server side.
- The issue can be found in the source code on the client side.
Remedy suggestions |
---|
The best solution to avoid unvalidated redirects is not to use any redirects or forwards. However, if the website or web application cannot function properly without redirects or forwards, there is a number of ways how to handle them safely:
- If you have a limited number of the destination URLs to redirect, all of them can be stored in long time storage (for example, database) with specific identifiers. Such identifiers can be used as request parameters that redirect to the relevant URL.
- If it is not possible to list destination pages, and user input cannot be avoided, ensure that the supplied value is valid, appropriate for the application, and authorized for the user.
- Sanitize the input by creating a list of trusted URLs (lists of hosts or a regex). Use the whitelist approach.
- Remove the hostname from the redirection URL, so that it may only redirect to a different path on the same domain as the application.
- Lead all redirects to a notification message / special page with the information that the user is leaving your site. So that the user should confirm the redirect.
Classifications |
---|
- CWE-601
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Updated over 2 years ago