Anmol Singh Yadav discovered a race condition vulnerability in a cloud-based business management platform’s OAuth 2.0 implementation, allowing him to hijack OAuth tokens. By exploiting parallel authorization flow requests with manipulated state and code_verifier values, he obtained access tokens not tied to his session, leading

4m read timeFrom infosecwriteups.com
Post cover image
Table of contents
How I Hijacked OAuth Tokens Through a Parallel Auth Flow Race Condition — $8500 P1 Bug Bounty 💰Target OverviewWhat is an OAuth Vulnerability?The Flaw: A Parallel Authorization Flow Race ConditionStep-by-Step Exploitation

Sort: