Open Redirect

Severity
High
Applies to
Step
Links
CWE-601 CWE-20

Why This Issue Is Important

Open Redirect vulnerabilities allow attackers to redirect users to malicious websites without their knowledge. This can lead to phishing attacks, theft of sensitive information, or other malicious activities. By manipulating the Location header, an attacker can craft a URL that appears legitimate but redirects to an entirely different destination, compromising user trust and security.

How This Issue Is Detected

This issue is detected by analyzing the flow of data into the Location header within. If user-controlled input is found to influence the Location header, the issue is flagged. The trace provided includes all steps where the data flows from the user input to the header, helping identify the exact point of vulnerability.

How to Fix the Issue

Ensure that the value used in the Location header is either static, or user-controlled data is sanitized, encoded, and validated. This can be done by applying input validation to filter out potentially dangerous input or by avoiding the use of user-controlled data in sensitive headers altogether.