Open Redirect
There are many DM people with me about this bug. As a result, I have consolidated all my processed "Open redirects" reports this month.
Payloads bypass most filters:
http:http:evil[.]com http:/evil%252ecom ///www.x.com@evil.com
when you are looking for bugs like SSRF & Open Redirect. and there is a blacklisted character. try to bypassed using other Unicode characters. I found Open Redirect Bypass Using (。) Chinese dot "%E3%80%82". poc: redirect_to=////evil%E3%80%82com #BugBounty #bugbountytip
Blogs"
Last updated