Bearer v1.8.1
  • Join the Discord Community
  • Join us on GitHub
  • Get Started
  • Get Started

    • Quick Start
  • Guides

    • Configure the scan
    • Set up CI/CD
    • Using the GitHub action
    • Create a custom rule
  • Explanations

    • How Bearer CLI works
    • Scanner types
    • Report types
    • Sensitive data flow
    • Dynamic severity levels
  • Reference

    • Installation
    • Configuration
    • Commands
    • Rules
    • Data Types
    • Recipes
    • Supported Languages
  • Contributing

    • Overview
    • Contribute code
    • Contribute documentation
    • Contribute new recipes
  • Reference
  • Rules

Open redirect detected

  • Rule ID: ruby_rails_open_redirect
  • Languages: ruby
  • Source: open_redirect.yml

Description

A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks.

Associated CWE

  • CWE-601: URL Redirection to Untrusted Site ('Open Redirect')

OWASP Top 10

  • A01:2021 - Broken Access Control

Ready to take the next step? Join the Bearer Cloud waitlist.

On this page

Overview
  1. Description
  2. Associated CWE
  3. OWASP Top 10

Contribute

  • Edit this page
  • Leave feedback

Ready to take the next step? Join the Bearer Cloud waitlist.