-
Notifications
You must be signed in to change notification settings - Fork 6
Open
Description
Attacker chooses PKCE verifier and obtains code through leakage (referrer etc)
- attacker impersonates legit client (works for public clients only)
- attacker abuses legit client (e.g. payment initiation issue)
options:
- invalidate code after exchange attempt with wrong PKCE verifier (similar to RT rotation and replay detection)
- requires cooperation of "client under attack"
- requires AS to enforce PKCE challenge for every authorization request (!)
Metadata
Metadata
Assignees
Labels
No labels