hi *, just sharing.

Not directly related to OAuth per se but it exploits several OAuth client 
endpoints due to some common developers pattern 
http://www.benhayak.com/2015/06/same-origin-method-execution-some.html 
(concrete example in 
http://www.benhayak.com/2015/05/stealing-private-photo-albums-from-Google.html)

regards

antonio
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to