Also Known As:
Open Redirect, External Redirect, Phishing via Redirect, URL Redirector Abuse
Input Validation, Secure Design
Quick Introduction to the Topic:
Vector Operation Method:
Attackers can abuse features in the application that redirect users to user-controlled URL addresses, in order to craft malicious links that redirect unaware users to a phishing website, while relying on the trust the user holds for the domain address of the clicked link.