> -----Original Message-----
> From: Niv Steingarten [mailto:nivst...@gmail.com]
> Sent: Thursday, August 18, 2011 12:12 PM
> To: Eran Hammer-Lahav
> Cc: Torsten Lodderstedt; oauth@ietf.org
> Subject: Re: [OAUTH-WG] Draft 20 last call comment (Resource Owner
> Impersonation)
> 
> On Thu, Aug 18, 2011 at 21:17, Eran Hammer-Lahav <e...@hueniverse.com>
> wrote:
> >
> >
> >> -----Original Message-----
> >> From: Niv Steingarten [mailto:nivst...@gmail.com]
> >> Sent: Thursday, August 18, 2011 11:08 AM
> >> To: Eran Hammer-Lahav
> >> Cc: Torsten Lodderstedt; oauth@ietf.org
> >> Subject: Re: [OAUTH-WG] Draft 20 last call comment (Resource Owner
> >> Impersonation)
> >>
> >> On Thu, Aug 18, 2011 at 20:31, Eran Hammer-Lahav
> >> <e...@hueniverse.com>
> >> wrote:
> >> >
> >> >
> >> >> -----Original Message-----
> >> >> From: Niv Steingarten [mailto:nivst...@gmail.com]
> >> >> Sent: Thursday, August 18, 2011 10:16 AM
> >> >> To: Eran Hammer-Lahav
> >> >> Cc: Torsten Lodderstedt; oauth@ietf.org
> >> >> Subject: Re: [OAUTH-WG] Draft 20 last call comment (Resource Owner
> >> >> Impersonation)
> >> >>
> >> > Can you provide another example with the same level of detail as
> >> > you
> >> provided below?
> >>
> >> The malicious client sends a request to the authorization endpoint
> >> with the appropriate parameters, and in return receives the markup of
> >> the web-page which should be displayed to the user in order to get
> >> consent. In addition, since the request is launched not via a
> >> sandboxed user-agent, the client also has access to any 'Set-Cookie'
> >> HTTP headers.
> >>
> >> Instead of displaying the page to the user, the client extracts the
> >> web-form data (including the hidden nonce/token) which would be
> >> submitted when 'Allow' is clicked. It then forges the appropriate
> >> POST request with the cookies, form data and referrer, and dispatches
> >> it,
> >
> > SCENE MISSING [1]
> >
> >> to finally receive an access token/authorization code in the redirection.
> >
> > You skipped the best part!
> >
> > What do you mean by "dispatches it"? How is the resource owner tricked
> or abused to grant authorization unknowingly? I understand how your
> proposal "fixes" the first half, but not what kind of attack is happening in 
> the
> second half.
> >
> 
> I might have accidentally skipped the part where the user is already logged in
> at the authorization endpoint, so no log-in is required but rather just
> allowing/denying access (correction: the first request is sent using an HTTP
> framework/WebKit, so no access to cookies). Once it extracts the data from
> the web-form, the client has all the information it needs in order to create 
> an
> HTTP request 

No - the attacker does not have access to the session cookie. It still needs to 
find a way to make a CSS call.

> and launch it using the same HTTP framework/WebKit,
> simulating the "Allow" button.

This is still just a CSRF attack.

In order to automate the approval action, they attacker has to get the 
user-agent (embedded or not) to make a cross site request which will include 
some session state (cookies or otherwise). If the authorization page is CSRF 
protected, they attacker will not be able to construct such a link.

The nature of the client does not matter. In either case, the client has to 
gain access somehow to the authorization server state stored in the browser.

EHL

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to