How this template works
APIs Selection
The API selection filters in this template are used to filter the requests based on the response code. In this case, the filter is set to only select requests with a response code equal to 302 (redirect).
Execute request
The execute section of the template specifies the type of execution (single) and the requests to be executed. In this case, the requests include adding various headers with the value "evil.com" to test for open redirect vulnerability. The follow_redirect parameter is set to false to prevent automatic redirection.
Validation
The validation section defines the criteria for validating the response. It checks if the response code is equal to 302 and if the response headers contain the key "location" with a value that contains either "evil.com". This ensures that the response indicates a redirect to a potentially malicious website.
Frequently asked questions
Explore other tests
eSMTP - Config Discovery
Nginx - Git Configuration Exposure
Laravel - Sensitive Information Disclosure
Docker Container - Misconfiguration Exposure
Msmtp - Config Exposure
Parameters.yml - File Discovery
Mongo Express - Unauthenticated Access
Apache Airflow Configuration Exposure
Dockerrun AWS Configuration Exposure
Apache Config file disclosure
Appspec Yml Disclosure
CGI script environment variable