CWE-601 - URL Redirection to Untrusted Site ('Open Redirect')
CWE-601 Low
- Abstraction:
- Base
- Structure:
- Simple
- Status:
- Draft
- Weakness Name
URL Redirection to Untrusted Site ('Open Redirect')
- Description
A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks.
An http parameter may contain a URL value and could cause the web application to redirect the request to the specified URL. By modifying the URL value to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials. Because the server name in the modified link is identical to the original site, phishing attempts have a more trustworthy appearance. Whether this issue poses a vulnerability will be subject to the intended behavior of the application. For example, a search engine might intentionally provide redirects to arbitrary URLs.
- Common Consequences
Scope: Access Control
Impact: Bypass Protection Mechanism, Gain Privileges or Assume Identity
Notes: The user may be redirected to an untrusted page that contains malware which may then compromise the user's machine. This will expose the user to extensive risk and the user's interaction with the web server may also be compromised if the malware conducts keylogging or other attacks that steal credentials, personally identifiable information (PII), or other important data.
Scope: Access Control, Confidentiality, Other
Impact: Bypass Protection Mechanism, Gain Privileges or Assume Identity, Other
Notes: The user may be subjected to phishing attacks by being redirected to an untrusted page. The phishing attack may point to an attacker controlled web page that appears to be a trusted web site. The phishers may then steal the user's credentials and then use these credentials to access the legitimate web site.
- Related Weaknesses
- Related Alerts
- Release Date:
- 2007-05-07
- Latest Modification Date:
- 2024-02-29
Free security scan for your website