Open redirection occurs when an application uses user-controllable data to redirect users to a URL.
An attacker with malicious intent could manipulate a user to browse into a specially crafted URL, such as
https://trusted.example.com?url=evil.example.com
, to redirect the victim to his evil domain.
Tricking users into sending the malicious HTTP request is usually the main task of exploiting an open redirection. Often, it requires an attacker
to build a credible pretext to prevent suspicions from the victim.
Attackers commonly use open redirect exploits in mass phishing campaigns.
What is the potential impact?
If an attacker tricks a user into opening a link of his choice, the user is redirected to a domain controlled by the attacker.
From then on, the attacker can perform various malicious actions, some more impactful than others.
Below are some real-world scenarios that illustrate some impacts of an attacker exploiting the vulnerability.
Domain Mirroring
A malicious link redirects to an attacker’s controlled website mirroring the interface of a web application trusted by the user. Due to the
similarity in the application appearance and the apparently trustable clicked hyperlink, the user struggles to identify that they are browsing on a
malicious domain.
Depending on the attacker’s purpose, the malicious website can leak credentials, bypass Multi-Factor Authentication (MFA), and reach any
authenticated data or action.
Malware Distribution
A malicious link redirects to an attacker’s controlled website that serves malware. On the same basis as the domain mirroring exploitation, the
attacker develops a spearphishing or phishing campaign with a carefully crafted pretext that would result in the download and potential execution of a
hosted malicious file.
The worst-case scenario could result in complete system compromise.