Description
Drupal Core allows overriding the redirect target using the destination query parameter. This allows an attacker to redirect the user to an external domain. For example, the following URL:
http://www.drupal.local//?destination=https://attacker.com\@www.drupal.local/will redirect the user to the domain attacker.com.
Remediation
Upgrade to the latest version of Drupal.
Block requests with multiple forward slashes that contain an external domain in the destination parameter.
References
Related Vulnerabilities
Liferay Portal URL Redirection to Untrusted Site ('Open Redirect') Vulnerability (CVE-2022-28977)
WordPress Plugin Quick Page/Post Redirect Open Redirect (5.1.5)
WordPress 4.1.x Multiple Vulnerabilities (4.1 - 4.1.15)
WordPress URL Redirection to Untrusted Site ('Open Redirect') Vulnerability (CVE-2018-10100)