How I Discovered an Open Redirect
一位漏洞赏金猎手发现了一个开放重定向漏洞,该漏洞允许攻击者将用户重定向至恶意网站。这种漏洞通常因开发者未对输入进行充分验证而产生。攻击者可借此实施钓鱼攻击或更严重的安全威胁。 2025-5-20 04:38:33 Author: infosecwriteups.com(查看原文) 阅读量:3 收藏

Ehtesham Ul Haq

Free Article Link: Click for free!

As a bug bounty hunter, I often explore different features of web applications, especially the login and redirection mechanisms. These parts are very common places for security mistakes, especially if developers forget to validate user inputs properly.

Recently, while testing one of the domains I had permission to test (target.com), I found a simple but potentially dangerous Open Redirect vulnerability. This kind of issue may seem small at first, but in the wrong hands, it can be used to trick users, launch phishing attacks, and even sometimes help with more serious attacks like SSRF.

Let me explain how I found it and how it works.

Before we dive into the vulnerability, let’s take a moment to understand what Open Redirect means.

An Open Redirect happens when a website lets you redirect users to any URL you provide in a link, without checking if the destination is safe or trusted. For example, if you click on a link like:

https://target.com/login?redirect_url=https://evil.com

And after logging in, the website sends you directly to https://evil.com, that’s an Open Redirect. A secure website should never allow this unless the…


文章来源: https://infosecwriteups.com/how-i-discovered-an-open-redirect-3b01879b6ebc?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh