An issue was filed in the OpenID Connect repository at 
https://bitbucket.org/openid/connect/issues/2074/parameter-pollution-with-redirect_uri
 that the working group believes is actually about OAuth and not specific to 
OpenID Connect.  The description of the issue is:


We have researched the OAuth protocol and identified a new class of attack OPP 
derived from the pollution of the redirect_uri in the Authorization request, 
which affected 10/16 popular IDPs.
PAPER<https://innotommy.com/Wrong_redirect_uri_validation_in_OAuth-4.pdf>

Including an attacker code as a parameter of the redirect_uri in the 
Authorization request generates an Authorization response containing double 
code parameters. This can cause a loginCSRF attack on the Client site.

We would like to see the specification to include a check over the redirect_uri 
parameters in the Authorization request.
For example, an explicit directive to refuse requests containing a redirect_uri 
with a code parameter in the Authorization request.

I'm curious to hear people's analysis of this and whether, for instance, 
there's guidance that we should add to the OAuth Security BCP.

                                                       -- Mike

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to