Closed tkal closed 10 months ago
Hi @tkal, thanks so much for the submission!
One thing we have been focusing on is reusable attack techniques over patchable vulnerability descriptions. However, that can be as simple as the name for the technique. I'm thinking perhaps "Hijack OAuth redirect URIs" might be a good substitute for a name in that case, what do you think?
Second question is do you have any current valid examples or well documented historical examples? We don't always have an example for everything but it's great to have them when we can.
This is awesome! Agree on the name, perhaps ""Hijack OAuth flows" to keep it simple, leakage makes it sound passive.
I agree that "Hijack OAuth flows" seems more appropriate for the name! As for the examples, I can add the below disclosed bug bounty reports and maybe add more references from PortSwigger. What do you think?
Yeah, those look like good examples. I think this is one technique where we are unlikely to have a current example we can show a walkthrough example for so good historical examples like that are the next best thing.
Adding a highly used technique when attacking SaaS application that implement OAuth.