AWS logo
Amazon QDetector LibrarySign in to Amazon Q
AWSbreadcrumb dividerDocumentationbreadcrumb dividerAmazon Qbreadcrumb dividerDetector Librarybreadcrumb dividerC#breadcrumb dividerUnvalidated RedirectFeedbackFeedback icon

Amazon Q

Detector Library

C# detectors (44/44)

Method Input ValidationPassword ComplexityXml External EntityMemory Marshal CreateSpanCross-Site Request Forgery (CSRF)Module InjectionImproper Cryptographic Signature VerificationObsolete CryptographyInefficient Regular ExpressionDouble Epsilon EqualityUnrestricted File UploadOutput Cache ConflictsUnsafe XSLT Setting UsedCross Site Scripting (XSS)Weak Cipher AlgorithmStack Trace ExposureXPath InjectionThread Safety ViolationOS Command InjectionUnvalidated RedirectInteger OverflowAvoid Persistent CookiesUntrusted DeserializationLDAP InjectionWeak Random Number GenerationSQL InjectionPath TraversalDebug BinarySensitive Information LeakWebconfig Trace EnabledInter Process Write of RegionInfoCode InjectionMissing AuthorizationJWT TokenValidationParameters No ExpiryRazor Use of html stringServer-Side Request Forgery (SSRF)Origins Verified Cross Origin CommunicationsPrevent Excessive AuthenticationImproper AuthenticationCertificate Validation DisabledInsecure CryptographyLog InjectionMass AssignmentCookie Without SSL Flag

Unvalidated Redirect High

The application may allow open redirects if created using user supplied input. Open redirects are commonly abused in phishing attacks where the original domain or URL looks like a legitimate link, but then redirects a user to a malicious site.

Detector ID
csharp/unvalidated-redirect@v1.0
Category
Security
Common Weakness Enumeration (CWE) external icon
CWE-601
Tags
-