The application attempts to prevent redirection attacks by blocking absolute redirection targets starting with http:// or https://. However, an attacker can defeat this defense by omitting the protocol prefix from their absolute URL. If a redirection target starting with // is specified, then the browser will use the same protocol as the page which issued the redirection. The application also appears to be blocking the standard protocol-relative sequence (//). However, an attacker can defeat this defense by using backslashes instead. Some browsers (notably Chrome and Safari) accept these non-standard protocol-relative sequences.
Bypass Response #2
Published by crowdshield on 07/01/2015 [Blog Home] crowdshield,1N3,2015,tutorial,poc,infosec,institute,open,redirect,demo,bypass,bugbounty