TL;DR

["Unvalidated redirects and forwards, once a high-profile OWASP Top 10 issue, have been merged into 'Sensitive Data Exposure'. Despite this change in classification, their potential impact remains significant as they can be exploited to bypass authentication mechanisms.", 'Operators must reassess the security of redire

What happened

["In 2010, OWASP highlighted unvalidated redirects and forwards as a critical vulnerability. By 2013, this was merged into 'Sensitive Data Exposure'.", 'Despite this shift, the impact of open redirects remains significant.', 'Operators are reminded to scrutinize redirect mechanisms for security vulnerabilities.']

Why it matters for ops

['Unvalidated redirects can lead to unauthorized access or injection attacks by directing users to malicious sites bypassing authentication checks.', 'While often considered low risk, these vulnerabilities can be exploited in conjunction with other weaknesses to cause severe damage.']

Mitigation

  • Implement strict validation for redirect URLs.
  • Use white-listing to ensure that only safe, internal redirects are allowed.

Action items

  • Review and update security policies regarding open redirects.
  • Conduct thorough audits of existing web application codebases for vulnerable redirect functions.
  • Educate developers about the risks associated with unvalidated redirects and forwards.

Detection IOCs

  • HTTP response codes: 301 Moved Permanently or 302 Found without proper validation.
  • Suspicious outbound HTTP requests from a server to untrusted domains

Source link

https://isc.sans.edu/diary/rss/32742