CGI Generic Open Redirection

Medium Nessus Plugin ID 47834

Synopsis

A web application is potentially vulnerable to uncontrolled redirection.

Description

By providing specially crafted parameters to CGIs, Nessus was able to redirect to a third-party website.

As redirections are commonly used, it is possible that users will be unaware that something abnormal is happening.

This kind of attack can be used to steal confidential data, typically credentials (phishing).

Solution

Modify the relevant CGIs so that they properly escape arguments.

See Also

https://en.wikipedia.org/wiki/URL_redirection#Manipulating_visitors

https://www.owasp.org/index.php/Open_redirect

Plugin Details

Severity: Medium

ID: 47834

File Name: torture_cgi_redirection.nasl

Version: 1.18

Type: remote

Family: CGI abuses

Published: 2010/07/26

Updated: 2018/11/15

Dependencies: 67257, 47830, 10107, 39471, 56243

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Information

Required KB Items: Settings/enable_web_app_tests

Reference Information

CWE: 601, 722, 801, 819, 928, 938