How an Open Redirect Vulnerability Got a Bug Bounty of $500

2 months ago 20
BOOK THIS SPACE FOR AD
ARTICLE AD

Karthikeyan Nagaraj

Open Redirect vulnerabilities may seem minor at first, but they can have significant consequences when exploited correctly. In one instance, a bug bounty hunter was able to identify an open redirect flaw in a web application, leading to a $500 bug bounty reward. This article will walk you through the basics of Open Redirect vulnerabilities, how they can be exploited, and how you can start testing for them in bug bounty programs.

An Open Redirect vulnerability occurs when an application accepts user-controlled input in a URL and redirects the user to an external website without proper validation. This means an attacker can manipulate the input to send users to a malicious site.

For example:

A vulnerable website may have a URL like:https://target-site.com/redirect?url=https://legitimate-site.comAn attacker can change the url parameter to redirect users to a malicious site:https://target-site.com/redirect?url=https://malicious-site.com
Read Entire Article