fuzzdb/attack/redirect/README.md

22 lines
1.1 KiB
Markdown
Raw Permalink Normal View History

* redirect-injection-template.txt
* Patterns for injecting into a value for attempting to bypass many input validation filters that intended to only allow only relative links on the same origin.<br>
* redirect-urls-template.txt
* URL patterns that commonly lead to open redirect. <br>
2016-10-12 07:44:16 +00:00
<b>Usage:</b> <br>
Replace {target} in files with ip or hostname and path, Examples: <br>
* evil.com <br>
* evil.com/badurl<br>
* 1.2.3.4 <br>
* 134744072<br>
2016-10-12 07:44:16 +00:00
<b>Testing techniques:</b><br>
Filter Bypass
* If periods are being stripped by the filter so that evil.com becomes evilcom, try converting the ip address to decimal notation form.
http://www.geektools.com/geektools-cgi/ipconv.cgi
* Try URL-encoding the replacement value for {target}
2016-10-12 07:44:16 +00:00
Other Issues
* If redirect.injection.template.txt usage results in the server proxying a request to the injected URL and returning its contents instead of redirecting to it, explore how this could be used to explore the servers localhost ports for web services, protected systems in a DMZ, interact through GET requests/REST interfaces, etc.
TODO