It's all about how you can swipe a token and inject it into another application. It's easier to trap and inject a token in the implicit flow because it's exposed to the user agent and there's no client secret tied to the token's issuance. To get the same trick to work with the code flow on server-based confidential clients, you'd need to inject your rogue token into the client's configuration or state. With the implicit flow and on devices, it's a bit easier just because the parts of the system that need access to the token are more accessible.

 -- Justin

On 06/29/2012 12:53 PM, Antonio Sanso wrote:
Hi John

On Jun 29, 2012, at 1:43 AM, John Bradley wrote:

Authenticating to the client is NOT safe with all of the flows
you are perfectly right here. At the begin of this discussion and reading your blog post 
I was under the impression that this "attack" was tight to the use of the 
implicit grant flaw.
But this is not actually the case as I could reproduce the same scenario 
against a client using the Authorization Code flaw.

Regards

Antonio

_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth


_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to