devanshbatham / OpenRedireX

A fuzzer for detecting open redirect vulnerabilities
MIT License
690 stars 129 forks source link

error while processing the url #21

Closed oldDuDe124 closed 1 year ago

oldDuDe124 commented 1 year ago

hi

i'm facing this issue here:

echo 'https://domain.tld&path=FUZZ' | openredirex -k FUZZ


/ ___ __ / _ __/ (_)____ / / / / \/ _ \/ \/ // / \/ / / _/ | |// / // / // / / / / / , / / // / / / / /> <
__
/ .__
/_// /// ||_/_,/// __//||
/
/

[INFO] Processing 1 URLs with 3 payloads. [ERROR] Error fetching: https://domain.tld&path=//example.com@google.com/%2f.. [ERROR] Error fetching: https://domain.tld&path=///google.com/%2f.. [ERROR] Error fetching: https://domain.tld&path=///example.com@google.com/%2f.. Processing: 100%|████████████████████| 3/3 [00:02<00:00, 14.72url/s]

i know domain.tld has an open redirect vulnerability in the given parameter but this tool doesn't seem to be finding that and i don't know what is causing the error either. i'm using ubuntu 22 and i have installed all the required python libraries.

i'll appreicate your help

devanshbatham commented 1 year ago

Currently it only detects redirects based on the Location header, so it it is a JS based redirect, it will not be detected.