HTTP redirect handling is critical for active scanning. Many vulnerabilities are only visible after following one or more redirects (e.g., open redirects, certain XSS, authentication bypasses).
π Redirect Types
The RedirType field controls how Burp Bounty Pro handles HTTP redirects during active scanning:
RedirType
Name
Behavior
0
π« Never
Never follow redirects. Only analyze the initial response.
1
π On-site only
Follow redirects only if the target host matches the original request host.
2
π― In-scope only
Follow redirects only if the target URL is within Burp Suite's target scope.
3
π Always
Follow all redirects regardless of destination.
4
π’ Follow redirects
Follow redirects up to the configured maximum limit.
π’ Maximum Redirects
The MaxRedir field sets the maximum number of redirects to follow per request chain:
{"RedirType":4,"MaxRedir":5}
This follows up to 5 redirects before stopping.
π Supported Redirect Status Codes
Burp Bounty Pro handles these HTTP redirect status codes:
Code
Name
Description
300
Multiple Choices
π Multiple redirect options
301
Moved Permanently
π Permanent redirect
302
Found
π Temporary redirect
303
See Other
β‘οΈ Redirect with GET method
307
Temporary Redirect
π Temporary redirect preserving method
308
Permanent Redirect
π Permanent redirect preserving method
π‘οΈ Redirect Loop Protection
To prevent infinite redirect loops, Burp Bounty Pro enforces a hard limit of 30 redirects per request chain, regardless of the MaxRedir setting.
π― Choosing the Right Redirect Mode
π Open Redirect Testing
Follow redirects to verify the server redirects to the attacker-controlled domain. Match the Location header or response body after redirection.
π SSRF Testing
Often best to not follow redirects when testing SSRF. Check the initial response for redirect headers pointing to internal resources, or use Burp Collaborator for out-of-band confirmation.
π XSS Testing
Follow a few redirects to check if the payload is reflected in the final response after any redirects.
π Path Traversal
Follow on-site redirects only to handle 301 redirects for directory normalization.
π‘οΈ Security Header Checks
Never follow redirects β check the headers on the initial response.
π Example Configurations
π CORS Misconfiguration
Follow a few redirects since CORS headers may only appear after redirection.
π Open Redirect with Parameter Pollution
Follow redirects and match the redirect chain for the attacker domain.
π CVE Exploitation
Follow redirects generously since exploit responses may involve multiple redirects.