The Python example server implements the request token URL using
OAuthServer.fetch_request_token().
If the consumer passes an oauth_token parameter to the request token URL
for a valid request token, fetch_request_token() will return that token
without any signature checking rather than checking the signature and
creating a new token. The existing token and its secret are then returned
to the consumer.
You might need a bit more information to perform a successful attack, but
leaking this information seems like a problem. There should probably be
separate methods for use by the "request token" and "authorisation" stages.
Original issue reported on code.google.com by james.he...@gmail.com on 9 Oct 2008 at 7:05
Original issue reported on code.google.com by
james.he...@gmail.com
on 9 Oct 2008 at 7:05