CWE-601: URL Redirection to Untrusted Site ('Open Redirect')
low-riskThe web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Common Consequences
Detection Methods
Since this weakness does not typically appear frequently within a single software package, manual white box techniques may be able to provide sufficient code coverage and reduction of false positives if all potentially-vulnerable operations can be assessed within limited time constraints.
Automated black box tools that supply URLs to every input may be able to spot Location header modifications, but test case coverage is a factor, and custom redirects may not be detected.
Automated static analysis tools may not be able to determine whether input influences the beginning of a URL, which is important for reducing false positives.
Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)
According to SOAR [REF-1479], the following detection techniques may be useful: Highly cost effective: Bytecode Weakness Analysis - including disassembler + source code weakness analysis Binary Weakness Analysis - including disassembler + source code weakness analysis
According to SOAR [REF-1479], the following detection techniques may be useful: Highly cost effective: Web Application Scanner Web Services Scanner Database Scanners
According to SOAR [REF-1479], the following detection techniques may be useful: Highly cost effective: Fuzz Tester Framework-based Fuzzer
According to SOAR [REF-1479], the following detection techniques may be useful: Highly cost effective: Manual Source Code Review (not inspections)
According to SOAR [REF-1479], the following detection techniques may be useful: Highly cost effective: Source code Weakness Analyzer Context-configured Source Code Weakness Analyzer
According to SOAR [REF-1479], the following detection techniques may be useful: Highly cost effective: Formal Methods / Correct-By-Construction Cost effective for partial coverage: Inspection (IEEE 1028 standard) (can apply to requirements, design, source code, etc.)
Real-World Examples (10)
| CVE | CVSS | EPSS | KEV |
|---|---|---|---|
| CVE-2021-3654 | 6.1 | 87.2% | — |
| CVE-2021-3654 | 6.1 | 87.2% | — |
| CVE-2021-29622 | 6.5 | 86.7% | — |
| CVE-2018-11784 | 4.3 | 82.6% | — |
| CVE-2016-5385 | 8.1 | 81.3% | — |
| CVE-2019-10098 | 6.1 | 80.3% | — |
| CVE-2019-10098 | 6.1 | 80.3% | — |
| CVE-2020-15129 | 6.1 | 76.8% | — |
| CVE-2020-15129 | 6.1 | 76.8% | — |
| CVE-2017-1000117 | 8.8 | 76.4% | — |