janne
Integration Specialist
LEVEL 1
400 XP

Hey Folks, in this tutorial we are going to talk about an open source “Open Redirection” vulnerability finder tool called “OpenRedireX“. Simply tool takes the URL from the user and then it constantly tries to find open redirect issues using its own wordlist that called as “FUZZING“. If you want to get deeper information about this vulnerability then you can go here.
Key Features
- You can specify your own payloads in ‘payloads.txt’
- Shows Location header history (if any)
- Fast (as it is Asynchronous)
- Takes a url or list of urls and fuzzes them for Open redirect issues
Installation
The tool is available on github as it is an open source tool. The installation is quite simple but as we know that dependence is the most important factor during the installation of any type of tool. So we will download the dependency before starting the tool.
apt-get install python3-venv1apt-get install python3-venv

Now we will configure this tool in our terminal but first we have to download it from the github and then go the directory. It’s not enough as we have to execute one more python command at the end.
git clone https://github.com/devanshbatham/OpenRedireX
cd OpenRedireX
python3 -m venv env
python3 openredirex.py1234git clone
https://github.com/devanshbatham/OpenRedireXcd OpenRedireXpython3-mvenv envpython3 openredirex.py

The installation has been completed and now we will show you the features of this tool through given image. Use the given command to launch this tool.
python3 openredirex.py --help1python3 openredirex.py--help

live Website
Here you can see that we got open redirection vulnerability in live website through this tool, but due to security policy we can show you everything.

Demo
Here you can see that we are using XVWA vulnerabale application for demonstration. If you want to do same lab setup in your localhost machine then you can go here.

Just look at the command that we mentioned below and only manipulate the URL parameter according to yourself. You can also see that the command below mentions the FUZZ keyword which is instructing the vulnerable parameter.
Usage

python3 openredirex.py -u "http://192.168.1.10/xvwa/vulnerabilities/redirect/redirect.php?forward=FUZZ" -p payloads.txt --keyword FUZZ1python3 openredirex.py-u"http://192.168.1.10/xvwa/vulnerabilities/redirect/redirect.php?forward=FUZZ"-ppayloads.txt--keyword FUZZ

As you can clearly see it gives us many combinations of results from which we can exploit this vulnerability.

Don

