ajinabraham.njsscan.redirect.open_redirect.express_open_redirect
ajinabraham
Author
unknown
Download Count*
License
Untrusted user input in redirect() can result in Open Redirect vulnerability.
Run Locally
Run in CI
Defintion
rules:
- id: express_open_redirect
patterns:
- pattern-either:
- pattern-inside: function ($REQ, $RES, ...) {...}
- pattern-inside: function $FUNC($REQ, $RES, ...) {...}
- pattern-inside: $X = function $FUNC($REQ, $RES, ...) {...}
- pattern-inside: var $X = function $FUNC($REQ, $RES, ...) {...};
- pattern-inside: $APP.$METHOD(..., function $FUNC($REQ, $RES, ...) {...})
- pattern-either:
- pattern: |
$X.redirect(..., <... $REQ.$QUERY ...>, ...)
- pattern: |
$X.redirect(..., <... $REQ.$QUERY.$FOO ...>, ...)
- pattern: |
$INP = <... $REQ.$QUERY ...>;
...
$X.redirect(..., <... $INP ...>, ...)
- pattern: |
$INP = <... $REQ.$QUERY.$FOO ...>;
...
$X.redirect(..., <... $INP ...>, ...)
message: Untrusted user input in redirect() can result in Open Redirect
vulnerability.
languages:
- javascript
severity: ERROR
metadata:
owasp-web: a1
cwe: cwe-601
license: LGPL-3.0-or-later
vulnerability_class:
- Other
Short Link: https://sg.run/QxzQ