Or maybe another wg should address (http)? Phil
> On Jun 29, 2015, at 08:36, Justin Richer <jric...@mit.edu> wrote: > > Right, even though it’s not an OAuth problem, it’s a problem that is more > likely to come up and cause damage in situations that OAuth brings about (the > pop-up redirect page that Nat mentions). So, just like the advice to use the > system browser on mobile platforms, I think it’d be good to have actual > advice for developers so that they can avoid doing this. > > — Justin > >> On Jun 29, 2015, at 11:22 AM, Nat Sakimura <sakim...@gmail.com> wrote: >> >> s/Year/Yeah/ >> >> 2015-06-30 0:22 GMT+09:00 Nat Sakimura <sakim...@gmail.com>: >>> Year, from my skimming of the paper, it requires a page that executes >>> arbitrary callback function given as a parameter. >>> It is absolutely stupid to do it, but apparently there are such pages. >>> Prime candidate happens to be OAuth Redirection Endpoint. >>> By itself, it probably will not do much harm because you cannot do much >>> things in that window itself, >>> but if the window is a pop-up and keeps a parent context, it will >>> essentially be able to >>> remote control the parent window to do much more harm. >>> >>> So, it is not OAuth problem per se. >>> >>> However, it may be worthwhile to tell the developers to make sure that >>> redirection endpoint >>> accepts only valid oauth payload, and do not execute anything in the >>> parameter. >>> >>> Nat >>> >>> 2015-06-25 19:48 GMT+09:00 Antonio Sanso <asa...@adobe.com>: >>>> hi John >>>> >>>>> On Jun 25, 2015, at 1:42 AM, John Bradley <ve7...@ve7jtb.com> wrote: >>>>> >>>>> Thanks for the info, >>>>> >>>>> As I read it, this is an attack on Java Script callbacks. >>>>> >>>>> The information tying it to OAuth is not clear. >>>>> >>>>> Is the issue relating to JS people using the implicit flow and the JS >>>>> loaded from the client somehow being vulnerable? >>>>> >>>>> Or is this happening in the JS after authorization in calls to other >>>>> resources from the same origin, and it is just coincidence that people >>>>> are using OAuth. >>>> >>>> is more the second one :) Extrapolating from the white paper [0] >>>> >>>> "The most common technique tasked with ful lling >>>> the above described need is OAuth. In order to gain access to third-party >>>> resources >>>> using OAuth, the service shall utilize a third-party endpoint (OAuth >>>> dialog) that will >>>> ask for the resource owner's approval. The problem with this process is >>>> that redirecting >>>> the service to an OAuth dialog means losing the content of the currently >>>> open service >>>> document. For overcoming this problem, developers open a pop-up window to >>>> display >>>> the dialog in a singular browsing context. Once the user permits or denies >>>> access to >>>> the service, the OAuth dialog pop-up will be redirected to render a >>>> callback endpoint >>>> hosted on the service domain. This document should eventually notify the >>>> service that >>>> the process has been completed. >>>> For the new pop-up window to notify the service window upon approval, >>>> denial or for >>>> it to transfer access tokens or similar data, developers may implement >>>> callback endpoints >>>> that use a script referencing the "opener" window for executing a callback >>>> method of the >>>> service. When developers also opted for providing the service with the >>>> decision on how >>>> to "call it back" through a callback parameter, the entire domain becomes >>>> vulnerable to >>>> SOME." >>>> >>>> regards >>>> >>>> antonio >>>> >>>> [0] http://files.benhayak.com/Same_Origin_Method_Execution__paper.pdf >>>> >>>>> >>>>> Understanding if there is any Oauth specific advice to give would be >>>>> helpful. I see there are ways to prevent the SOME exploit. >>>>> >>>>> Regards >>>>> John B. >>>>> >>>>> >>>>>> On Jun 24, 2015, at 4:18 PM, Antonio Sanso <asa...@adobe.com> wrote: >>>>>> >>>>>> hi *, just sharing. >>>>>> >>>>>> Not directly related to OAuth per se but it exploits several OAuth >>>>>> client endpoints due to some common developers pattern >>>>>> http://www.benhayak.com/2015/06/same-origin-method-execution-some.html >>>>>> (concrete example in >>>>>> http://www.benhayak.com/2015/05/stealing-private-photo-albums-from-Google.html) >>>>>> >>>>>> regards >>>>>> >>>>>> antonio >>>>>> _______________________________________________ >>>>>> OAuth mailing list >>>>>> OAuth@ietf.org >>>>>> https://www.ietf.org/mailman/listinfo/oauth >>>> >>>> >>>> _______________________________________________ >>>> OAuth mailing list >>>> OAuth@ietf.org >>>> https://www.ietf.org/mailman/listinfo/oauth >>> >>> >>> >>> -- >>> Nat Sakimura (=nat) >>> Chairman, OpenID Foundation >>> http://nat.sakimura.org/ >>> @_nat_en >> >> >> >> -- >> Nat Sakimura (=nat) >> Chairman, OpenID Foundation >> http://nat.sakimura.org/ >> @_nat_en >> _______________________________________________ >> OAuth mailing list >> OAuth@ietf.org >> https://www.ietf.org/mailman/listinfo/oauth > > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth