Unvalidated Redirect Parameters
User-controlled parameters are passed directly to redirect_to without validation or allowlisting.
Authorization bypass and open redirect vulnerability in Ruby on Rails applications where redirect_to uses untrusted user parameters for the destination without validating host, path, or scheme, potentially exposing restricted pages or enabling phishing attacks by redirecting users to attacker-controlled sites.
Configuration changes required - see explanation below.
Configuration changes required - see explanation below.
User-controlled parameters are passed directly to redirect_to without validation or allowlisting.
Sourcery automatically identifies authorization bypass from user-controlled url in redirect_to in rails and many other security issues in your codebase.