OAuth Misconfiguration
Where to find
In the SSO feature. For example the URL will be looks like this
https://example/signin?response_type=code&redirect_uri=https://callback_url/auth&client_id=FQ9RGtMkztAgmAApKOqACrBNq&state=7tvPJiv8StrAqo9IQE9xsJaDso4&scope=+profile+email+phone+group+role+resourceHow to exploit
OAuth token stealing by changing
redirect_uriand Use IDN HomographNormal parameter
&redirect_uri=https://example.comIDN Homograph
&redirect_uri=https://еxamplе.com
If you notice, im not using the normal
eCreate an account with victim@gmail.com with normal functionality. Create account with victim@gmail.com using OAuth functionality. Now try to login using previous credentials.
OAuth Token Re-use.
Improper handling of state parameter
To exploit this, go through the authorization process under your account and pause immediately after authorization. Then send this URL to the logged-in victim
CSRF Attack
<a href="https://example.com/authorize?client_id=client1&response_type=code&redirect_uri=http://callback&scope=openid+email+profile">Press Here</a>
Lack of origin check.
Open Redirection on
redirect_uriparameterNormal parameter
&redirect_uri=https://example.comOpen Redirect
&redirect_uri=https://evil.com &redirect_uri=https://example.com.evil.com etc.
If there is an email parameter after signin then try to change the email parameter to victim's one.
Try to remove email from the scope and add victim's email manually.
Check if its leaking
client_secret
Last updated