Open Redirect

Open Redirect

By Rohit Gautam
Open Redirect 

Summary: Open Redirect is a web security vulnerability that occurs when an application redirects users to external URLs without proper validation or sanitization. By exploiting this vulnerability, an attacker can manipulate the redirection process to trick users into visiting malicious websites, phishing pages, or perform other malicious actions. 

Severity: Medium 

Attack Vector: Remote 

Complexity: Low 

Impact: By successfully exploiting an Open Redirect vulnerability, an attacker can deceive users, steal sensitive information, distribute malware, conduct phishing attacks, or perform other unauthorized actions under the guise of a trusted website. 

Affected IP Address: 

Port: 443 

Steps to Reproduce: 
1. Identify the target application that performs URL redirections. 
2. Analyze the application's redirection mechanism and URL validation/sanitization process. 
3. Craft a malicious URL by appending or modifying the redirection parameter to point to a malicious website or URL controlled by the attacker. 
4. Inject the malicious URL into the application's redirection mechanism, either through user input, query parameters, or other means. 
5. Persuade a user to click on a manipulated link leading to the vulnerable application and observe the redirection to the malicious URL. 


To mitigate Open Redirect vulnerabilities, consider the following recommendations: 
1. Validate and sanitize all user-supplied or untrusted input used in the redirection process. 
2. Implement a whitelist approach to specify valid redirection URLs or domains and reject others. 
3. Avoid using user-supplied input directly in the redirection URL. Instead, utilize a server-side mechanism to retrieve the intended target URL securely. 
4. Use relative URLs or internal redirects whenever possible to minimize the risk of Open Redirect vulnerabilities. 
5. Educate users about the risks of clicking on untrusted or unfamiliar links and encourage them to verify the authenticity of URLs before accessing them. 


1. OWASP - Unvalidated Redirects and Forwards:  
2. PortSwigger - Open Redirect:  

Proof of Concept: 

Please refer to the attached screenshot or video for a visual demonstration of an Open Redirect vulnerability.