Bearer v1.1.0
  • Join the Discord Community
  • Join us on GitHub
  • Get Started
  • Get Started

    • Quick Start
  • Guides

    • Using the GitHub action
    • Create a custom rule
  • Explanations

    • Scanner types
    • Report types
    • Sensitive data flow
  • Reference

    • Installation
    • Configuration
    • Commands
    • Rules
    • Data Types
    • Supported Languages
  • Contributing

    • Overview
    • Contribute code
    • Contribute documentation
    • Contribute new recipes
  • Reference
  • Rules

Open redirect detected.

  • Rule ID: javascript_lang_open_redirect
  • Languages: javascript
  • Source: open_redirect.yml

Description

A redirect using unsanitized user input is bad practice and puts your application at greater risk of phishing attacks.

Remediations

Avoid using redirects and forwards.

Resources

  • OWASP open redirect

Associated CWE

  • CWE-601: URL Redirection to Untrusted Site ('Open Redirect')

OWASP Top 10

  • A01:2021 - Broken Access Control

On this page

Overview
  1. Description
  2. Remediations
  3. Resources
  4. Associated CWE
  5. OWASP Top 10

Contribute

  • Edit this page
  • Leave feedback