If the phone is compromised, original app replaced by malicious app, then
RFC8252 will not help. The assumption is that the phone is not compromised.

On Tue, Sep 10, 2019 at 9:58 AM Masakazu OHTSUKA <o.masak...@gmail.com>
wrote:

> Hi,
>
> I've read rfc8252 and have questions about native apps, that I couldn't
> find answers on Internet.
>
> Imagine an attacker doing:
> 1. original app and authorization server conforms to rfc8252 4.1.
> Authorization Flow for Native Apps Using the Browser
> 2. clone the original app, name it malicious app and install on the target
> phone
> 3. remove the original app from the target phone
> 4. use the malicious app and authorize, OS will invoke malicious app using
> custom URL scheme
> 5. now malicious app has access to the access token
>
> How should we think about this?
> What am I missing?
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to