nuclei-templates/vulnerabilities/open-redirect.yaml

28 lines
1.8 KiB
YAML

id: open-redirect
info:
name: Open redirect Detection
author: melbadry9 & Elmahdi & @pxmme1337 & @Regala_ & @andirrahmani1
severity: low
description: A user-controlled input redirect users to an external website.
requests:
- method: GET
path:
- "{{BaseURL}}/evil.com/"
- "{{BaseURL}}/evil.com//"
- "{{BaseURL}}///;@evil.com"
- "{{BaseURL}}///evil.com/%2F.."
- "{{BaseURL}}/////evil.com"
- "{{BaseURL}}//evil.com/%2F.."
- "{{BaseURL}}//evil.com/..;/css"
- "{{BaseURL}}/evil%E3%80%82com"
- "{{BaseURL}}/%5Cevil.com"
- "{{BaseURL}}/?Page=evil.com&_url=evil.com&callback=evil.com&checkout_url=evil.com&content=evil.com&continue=evil.com&continueTo=evil.com&counturl=evil.com&data=evil.com&dest=evil.com&dest_url=evil.com&dir=evil.com&document=evil.com&domain=evil.com&done=evil.com&download=evil.com&feed=evil.com&file=evil.com&host=evil.com&html=evil.com&http=evil.com&https=evil.com&image=evil.com&image_src=evil.com&image_url=evil.com&imageurl=evil.com&include=evil.com&media=evil.com&navigation=evil.com&next=evil.com&open=evil.com&out=evil.com&page=evil.com&page_url=evil.com&pageurl=evil.com&path=evil.com&picture=evil.com&port=evil.com&proxy=evil.com&redir=evil.com&redirect=evil.com&redirectUri&redirectUrl=evil.com&reference=evil.com&referrer=evil.com&req=evil.com&request=evil.com&retUrl=evil.com&return=evil.com&returnTo=evil.com&return_path=evil.com&return_to=evil.com&rurl=evil.com&show=evil.com&site=evil.com&source=evil.com&src=evil.com&target=evil.com&to=evil.com&uri=evil.com&url=evil.com&val=evil.com&validate=evil.com&view=evil.com&window=evil.com&redirect_to=evil.com"
matchers:
- type: regex
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?evil\.com(?:\s*?)$'
part: header