FOLLOW FLUID ATTACKS
The system allows the introduction of a link
to an external site controlled by a malicious actor.
This site can then redirect the user to a different site
in the original tab,
making it look like a legitimate redirect performed by the system.
R173. Discard unsafe inputs
R324. Control redirects
Corporate member of The OWASP Foundation
Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.