Open Redirect (Open Redirect)
Why You Should Care About Open Redirect
Open redirects make phishing attacks more effective because the initial URL is on a trusted domain. A link like trusted-bank.com/redirect?url=evil-site.com looks legitimate at first glance. Users and email filters that check the domain see the trusted bank's domain, lowering their guard.
While open redirects alone do not directly compromise the vulnerable site, they are a trust amplifier for phishing attacks. They also appear in OAuth flows where the redirect_uri parameter, if not validated, can leak authorization codes or tokens to attacker-controlled servers.
Prevention involves validating all redirect destinations against a whitelist of allowed URLs or domains. Only allow redirects to paths on your own domain (relative URLs) or to explicitly approved external domains. Never use user-supplied URLs directly in redirect responses.
How to Verify
A security audit checks for common redirect parameters in your application. Test by substituting redirect URLs with external domains to see if the application follows them. Application security scanners also check for open redirect vulnerabilities.