The system allows the introduction of a link to an external site controlled by a malicious actor. This site can then redirect the user to a different site in the original tab, making it look like a legitimate redirect performed by the system.
Redirect to the user to an external site controlled by a malicious actor in the tab where original site was, leading to a phishing attack.
Set the attribute rel with the noopener and noreferrer value in each external link.
Anonymous attacker from local network.
⌚ 15 minutes.
Default score using CVSS 3.1. It may change depending on the context of the src.
Default score using CVSS 4.0. It may change depending on the context of the src.
The rel:noopener attribute is set in all external links of the application
<a href="uncontrolledUrl" rel="noopener noreferrer">Link to external web</a>
Some external links are not securely set on the application
<a href="uncontrolledUrl">Link to external web</a>