-
Notifications
You must be signed in to change notification settings - Fork 79
Open
Description
Summary of the attack
- Attacker registers a malicious OAuth client using the public
/register
endpoint. This endpoint lets them define their redirect_uri - Because the redirect_uri is under their control, they can initiate an OAuth authorization flow using the malicious client.
- When a victim clicks a specially crafted link (with the attacker's client_id and redirect_uri), the victim is redirected to the attacker's domain with a valid code.
- The attacker can now exchange that code for a valid access_token, as:
- They control the client_id and redirect_uri
- They generated the PKCE code_verifier themselves
- This lets the attacker impersonate the victim, as the access token reflects the victim’s session and authorization.
Neon's OAuth server does show a warning to the end-user/victim about the dynamically registered clients in call cases with client_id, client_name, and redirect_uris; however, this is not enough to prevent this impersonating attack.
Metadata
Metadata
Assignees
Labels
No labels