Am 22.04.2016 um 16:39 schrieb Antonio Sanso:
> hi Daniel
> 
> On Apr 22, 2016, at 4:35 PM, Daniel Fett <f...@uni-trier.de
> <mailto:f...@uni-trier.de>> wrote:
> 
>> Hi Antonio,
>>
>> Am 22.04.2016 um 16:30 schrieb Antonio Sanso:
>>>> Hi all,
>>>>
>>>> During our formal analysis of OAuth we found an attack that allows
>>>> CSRF. It is similar to the "code" leak described by Homakov in [1] and
>>>> therefore not really surprising. In this attack, the intention for an
>>>> attacker is to steal the "state" value instead of the "code" value.
>>>>
>>>> Setting:
>>>>
>>>> In the auth code grant, after authentication to the AS, the user is
>>>> redirected to some page on the Client. If this page leaks the
>>>> referrer, i.e., there is a link to the attacker's website or some
>>>> resource is loaded from the attacker, then the attacker can see not
>>>> only code but also state in the Referer header of the request.
>>>>
>>>> The fact that code can leak was described in [1]. Since code is
>>>> single-use, it might be already redeemed in most cases when it is sent
>>>> to the attacker.
>>>
>>> probably is not redeemed instead, just because the redirect_uri is
>>> not the correct one.
>>> The mitigation that good implemented AS use (also Github) is to
>>> follow section 4.1.3 the OAuth core specification [RFC6749], in
>>> particular:
>>>
>>> "ensure that the "redirect_uri" parameter is present if the
>>> "redirect_uri" parameter was included in the initial authorization
>>> request as described in Section 4.1.1, and if included ensure that
>>> their values are identical."
>>
>> The attack is not based on a manipulation of the redirect_uri. Instead,
>> a correct redirect_uri is used, but the page loaded from the
>> redirect_uri contains links or external resources (intentionally or not).
> 
> right. so is not really [1] :) since there there is manipulation using
> /../../ 

Of course.

> Now the real question why a legit redirect_uri should contain links to
> malicious external resources?

Well, why not? :)

Anyway, developers should be made aware that having external
resources/links on these pages is a bad idea.

- Daniel

-- 
Informationssicherheit und Kryptografie
Universität Trier - Tel. 0651 201 2847 - H436

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to