Switch branches/tags
Nothing to show
Find file History


Open URL Redirection

Unvalidated redirects and forwards are possible when a web application accepts untrusted input that could cause the web application to redirect the request to a URL contained within untrusted input. By modifying untrusted URL input to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials. Because the server name in the modified link is identical to the original site, phishing attempts may have a more trustworthy appearance. Unvalidated redirect and forward attacks can also be used to maliciously craft a URL that would pass the application’s access control check and then forward the attacker to privileged functions that they would normally not be able to access.


Replace www.whitelisteddomain.tld from Open-Redirect-payloads.txt with a specific white listed domain in your test case

To do this simply modify the WHITELISTEDDOMAIN with value www.test.com to your test case URL.

WHITELISTEDDOMAIN="www.test.com" && sed 's/www.whitelisteddomain.tld/'"$WHITELISTEDDOMAIN"'/' Open-Redirect-payloads.txt > Open-Redirect-payloads-burp-"$WHITELISTEDDOMAIN".txt && echo "$WHITELISTEDDOMAIN" | awk -F. '{print "https://"$0"."$NF}' >> Open-Redirect-payloads-burp-"$WHITELISTEDDOMAIN".txt


Using a whitelisted domain or keyword

www.whitelisted.com.evil.com redirect to evil.com

Using CRLF to bypass "javascript" blacklisted keyword


Using "//" to bypass "http" blacklisted keyword


Using "https:" to bypass "//" blacklisted keyword


Using "//" to bypass "//" blacklisted keyword (Browsers see // as //)


Using "%E3%80%82" to bypass "." blacklisted character


Using null byte "%00" to bypass blacklist filter


Using parameter pollution


Using "@" character, browser will redirect to anything after the "@"


Creating folder as their domain


XSS from Open URL - If it's in a JS variable


XSS from data:// wrapper


XSS from javascript:// wrapper


Common injection parameters


Thanks to