File: 51.md

package info (click to toggle)
python-vulndb 0.1.3-4
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 1,032 kB
  • sloc: python: 446; sh: 196; makefile: 2
file content (18 lines) | stat: -rw-r--r-- 724 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
Web applications occasionally use DOM input values to store the
address of the page to which the client will be redirected -- for
example: `yoursite.com/#/?redirect=www.yoursite.com/404.asp`

An
unvalidated redirect occurs when the client is able to modify the
affected parameter value and thus control the location of the
redirection. For example, the following URL
`yoursite.com/#/?redirect=www.anothersite.com` will redirect to
`www.anothersite.com`.

Cyber-criminals will abuse these
vulnerabilities in social engineering attacks to get users to
unknowingly visit malicious web sites.

The tool has discovered that
the web page does not validate the parameter value prior to
redirecting the client to the injected value.