TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Homakov on Covert Redirect OAuth exploit

3 pointsby woloskiabout 11 years ago

1 comment

jfromaabout 11 years ago
Basically the vulnerability is in the facebook side. Every oauth provider has a list of &quot;allowed redirect uris&quot;, a good oauth provider will check the entire url, but facebook doesn&#x27;t check the query string in the url. If you have a list of allowed redirects like:<p>- <a href="http://foo.com" rel="nofollow">http:&#x2F;&#x2F;foo.com</a> - <a href="http://foo.com/foo" rel="nofollow">http:&#x2F;&#x2F;foo.com&#x2F;foo</a><p>Facebook accepts redirects like: - <a href="http://foo.com?anything_here=xx" rel="nofollow">http:&#x2F;&#x2F;foo.com?anything_here=xx</a><p>And if the client has an open redirect, some query string to redirect anywhere combined with response_type token.. the evil website can get the token.