fuzzdb/attack/redirect
2016-10-12 03:44:16 -04:00
..
README.md Update arbitrary redirect docs 2016-10-12 03:44:16 -04:00
redirect-injection-template.txt Arbitrary redirect injection template 2016-10-12 02:36:00 -04:00
redirect-urls-template.txt Open redirect url patterns 2016-10-12 02:08:10 -04:00

  • redirect-injection-template.txt
    • Patterns for injecting into a value for attempting to bypass many input validation filters that intended to only allow only relative links on the same origin.
  • redirect-urls-template.txt
    • URL patterns that commonly lead to open redirect.

Usage:
Replace {target} in files with ip or hostname and path, Examples:

  • evil.com
  • evil.com/badurl
  • 1.2.3.4
  • 134744072

Testing techniques:
Filter Bypass

  • If periods are being stripped by the filter so that evil.com becomes evilcom, try converting the ip address to decimal notation form. http://www.geektools.com/geektools-cgi/ipconv.cgi
  • Try URL-encoding the replacement value for {target} Other Issues
  • If redirect.injection.template.txt usage results in the server proxying a request to the injected URL and returning its contents instead of redirecting to it, explore how this could be used to explore the servers localhost ports for web services, protected systems in a DMZ, interact through GET requests/REST interfaces, etc.

TODO