Attack OAuth
- Identify OAuth is being used.
-
Check configuration files:
-
/.well-known/oauth-authorization-server -
/.well-known/openid-configuration
-
-
Check if email and username can be changed in the
/authenticatePOST request. -
Check if we can redirect victim to our exploit server with
any
redirect_uriparameter. -
Try to link victim's social account to ours by exploring the
/oauth-linkingendpoint when it doesn't have anystateparameter protection if an "attach social profile" functionality exists. - Analyse the flow and check PortSwigger for examples of more attacks.