πŸ”„Redirections

HTTP redirect handling is critical for active scanning. Many vulnerabilities are only visible after following one or more redirects (e.g., open redirects, certain XSS, authentication bypasses).

πŸ“Š Redirect Types

The RedirType field controls how Burp Bounty Pro handles HTTP redirects during active scanning:

RedirType
Name
Behavior

0

🚫 Never

Never follow redirects. Only analyze the initial response.

1

🏠 On-site only

Follow redirects only if the target host matches the original request host.

2

🎯 In-scope only

Follow redirects only if the target URL is within Burp Suite's target scope.

3

🌐 Always

Follow all redirects regardless of destination.

4

πŸ”’ Follow redirects

Follow redirects up to the configured maximum limit.

πŸ”’ Maximum Redirects

The MaxRedir field sets the maximum number of redirects to follow per request chain:

{
  "RedirType": 4,
  "MaxRedir": 5
}

This follows up to 5 redirects before stopping.

πŸ“‹ Supported Redirect Status Codes

Burp Bounty Pro handles these HTTP redirect status codes:

Code
Name
Description

300

Multiple Choices

πŸ”€ Multiple redirect options

301

Moved Permanently

πŸ“Œ Permanent redirect

302

Found

πŸ”„ Temporary redirect

303

See Other

➑️ Redirect with GET method

307

Temporary Redirect

πŸ”„ Temporary redirect preserving method

308

Permanent Redirect

πŸ“Œ Permanent redirect preserving method

πŸ›‘οΈ Redirect Loop Protection

To prevent infinite redirect loops, Burp Bounty Pro enforces a hard limit of 30 redirects per request chain, regardless of the MaxRedir setting.

🎯 Choosing the Right Redirect Mode

πŸ”„ Open Redirect Testing

Follow redirects to verify the server redirects to the attacker-controlled domain. Match the Location header or response body after redirection.

🌐 SSRF Testing

Often best to not follow redirects when testing SSRF. Check the initial response for redirect headers pointing to internal resources, or use Burp Collaborator for out-of-band confirmation.

πŸ’‰ XSS Testing

Follow a few redirects to check if the payload is reflected in the final response after any redirects.

πŸ“‚ Path Traversal

Follow on-site redirects only to handle 301 redirects for directory normalization.

πŸ›‘οΈ Security Header Checks

Never follow redirects β€” check the headers on the initial response.

πŸ“š Example Configurations

🌐 CORS Misconfiguration

Follow a few redirects since CORS headers may only appear after redirection.

πŸ”„ Open Redirect with Parameter Pollution

Follow redirects and match the redirect chain for the attacker domain.

πŸ› CVE Exploitation

Follow redirects generously since exploit responses may involve multiple redirects.

Last updated