Description
Drupal Core allows overriding the redirect target using the destination query parameter. This allows an attacker to redirect the user to an external domain. For example, the following URL:
http://www.drupal.local//?destination=https://attacker.com\@www.drupal.local/will redirect the user to the domain attacker.com.
Remediation
Upgrade to the latest version of Drupal.
Block requests with multiple forward slashes that contain an external domain in the destination parameter.
References
Related Vulnerabilities
WordPress Plugin WP Js External Link Info Open Redirect (1.21)
WordPress Plugin WPtouch 'wptouch_redirect' Parameter URI Redirection (1.9.32)
WordPress Plugin Quick Page/Post Redirect Open Redirect (5.1.5)
Ruby on Rails URL Redirection to Untrusted Site ('Open Redirect') Vulnerability (CVE-2021-22881)