Attack OAuth
- Identify OAuth is being used.
-
Check configuration files:
-
/.well-known/oauth-authorization-server
-
/.well-known/openid-configuration
-
-
Check if email and username can be changed in the
/authenticate
POST request. -
Check if we can redirect victim to our exploit server with
any
redirect_uri
parameter. -
Try to link victim's social account to ours by exploring the
/oauth-linking
endpoint when it doesn't have anystate
parameter protection if an "attach social profile" functionality exists. - Analyse the flow and check PortSwigger for examples of more attacks.