{"id":13223,"date":"2021-05-27T11:50:33","date_gmt":"2021-05-27T06:20:33","guid":{"rendered":"https:\/\/www.varutra.com\/?p=13223"},"modified":"2022-12-02T12:38:22","modified_gmt":"2022-12-02T07:08:22","slug":"oauth-related-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.varutra.com\/varutravrt3\/oauth-related-vulnerabilities\/","title":{"rendered":"\u201cOAuth\u201d Related Vulnerabilities"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/varutra-1a3b6.kxcdn.com\/wp-content\/uploads\/2021\/05\/OAuth-Related-Vulnerabilities-1-1024x573.png\"  class=\"sh-overlay-item sh-table-cell ls-is-cached lazyloaded\" data-rel=\"lightcase\" title=\"OAuth Related Vulnerabilities 1 - Varutra Consulting\"><\/p>\n<h3>What is OAuth?<\/h3>\n<p>OAuth is a mechanism that is used by many companies like Amazon, Google, Microsoft, etc., which allows the user to view or share their account information with a third-party application. It is a commonly used open standard delegation which grants any user to access their information over other websites without the need to authenticate every single time.<\/p>\n<h4><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-13233 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/05\/What-is-Oauth.png\" alt=\"What is Oauth?\" width=\"672\" height=\"364\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/05\/What-is-Oauth.png 672w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/05\/What-is-Oauth-300x163.png 300w\" sizes=\"(max-width: 672px) 100vw, 672px\" \/><\/h4>\n<p style=\"text-align: center\">Fig: What is OAuth?<\/p>\n<p>&nbsp;<\/p>\n<h3>Why is it used?<\/h3>\n<p>In essence, OAuth provides access directly to the main application to perform functions to fetch data or use it your account, from another application.<br \/>\nIt is basically used to authenticate into the application directly through third-party sources without having a registered account in that application.<\/p>\n<p>&nbsp;<\/p>\n<h3>Entities used in OAuth 2.0.<\/h3>\n<p><strong>Resource Owner:<\/strong> The resource owner is the user\/entity granting access to their protected resource, such as their Google account contacts.<\/p>\n<p><strong>Resource Server<\/strong>: The server which handles the authenticated request, which the application forwards after it has obtained the access token from the resource owner.<\/p>\n<p><strong>Client Application:<\/strong> The component requesting authorization from the resource owner is the client application.<\/p>\n<p><strong>Authorization Server:<\/strong> Server which issues the access token to the client application when they successfully authenticate the resource owner.<\/p>\n<p><strong>Scope:<\/strong> Scope defines the level of accessing the client requests from the resource owner.<\/p>\n<p><strong>Redirect_Uri:<\/strong> The URL to which the user is redirected when the authorization is completed. Usually, this will the URL of the previously registered service.<\/p>\n<p><strong>State:<\/strong> While going back and forth the authorization server, the state is a parameter that persists the data between the user and the authorization server. Mostly it is recommended this value to be unique so that this value also provides a protection mechanism against CSRF.<\/p>\n<p><strong>Grant_type:<\/strong> The grant type is a parameter that specifies the grant type and the token is returned.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Now let us see the demo application from Port swigger lab exploiting this vulnerability.<\/strong><\/p>\n<p>\u2022 Capture the following request in the burp suite by clicking on login with social media.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-13231 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/05\/Intercepting-the-request..png\" alt=\"oauth demo step 1 - Intercepting the request.\" width=\"586\" height=\"307\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/05\/Intercepting-the-request..png 586w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/05\/Intercepting-the-request.-300x157.png 300w\" sizes=\"(max-width: 586px) 100vw, 586px\" \/><\/p>\n<p style=\"text-align: center\">Fig:1.1 Intercepting the request.<\/p>\n<p>\u2022 In the next request enter valid credentials as given and capture the request.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-13230 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/05\/Enter-the-given-credentials..png\" alt=\"oauth demo step 2 - Enter the given credentials.\" width=\"586\" height=\"304\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/05\/Enter-the-given-credentials..png 586w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/05\/Enter-the-given-credentials.-300x156.png 300w\" sizes=\"(max-width: 586px) 100vw, 586px\" \/><\/p>\n<p style=\"text-align: center\">Fig 1.2 Enter the given credentials.<\/p>\n<p>\u2022 Forward the request and you can see the email id parameter of the user.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-13232 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/05\/Next-request.png\" alt=\"oauth demo step 3 - Next request\" width=\"645\" height=\"289\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/05\/Next-request.png 645w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/05\/Next-request-300x134.png 300w\" sizes=\"(max-width: 645px) 100vw, 645px\" \/><\/p>\n<p style=\"text-align: center\">Fig 1.3 Next request<\/p>\n<p style=\"text-align: left\">\u2022 Change Email id to victim email and forward the request.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-13229 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/05\/email-change.png\" alt=\"Email change\" width=\"643\" height=\"269\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/05\/email-change.png 643w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/05\/email-change-300x126.png 300w\" sizes=\"(max-width: 643px) 100vw, 643px\" \/><\/p>\n<p style=\"text-align: center\">Fig 1.4 Email change<\/p>\n<p style=\"text-align: left\">\u2022 The attacker can successfully login into the victim account and resulting in a complete account takeover.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-13228 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/05\/Authenticated-Successfully.png\" alt=\"Authenticated Successfully\" width=\"643\" height=\"321\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/05\/Authenticated-Successfully.png 643w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/05\/Authenticated-Successfully-300x150.png 300w\" sizes=\"(max-width: 643px) 100vw, 643px\" \/><\/p>\n<p style=\"text-align: center\">Fig 1.5 Authenticated Successfully<\/p>\n<p>&nbsp;<\/p>\n<h3>Mitigation:<\/h3>\n<p>1. The client applications require to the whitelist of valid redirect Uri\u2019s.<br \/>\n2. Use strict byte-by-byte comparison for validating the URI in incoming requests.<br \/>\n3. Use pattern matching which will allow only the exact and complete matches.<br \/>\n4. This will prevent the attackers from accessing the pages on the domains which have been whitelisted.<br \/>\n5. Enforce the use of the state parameter. The value of this parameter should be bound to the user\u2019s session, including some unguessable, session-bound data like has which contains the session cookie. This is will also provide an added protection against <a href=\"https:\/\/portswigger.net\/web-security\/csrf\">CSRF-like attacks<\/a>, also making it a difficult task for an attacker to steal the authorization codes.<\/p>\n<p>Thank you.<\/p>\n<p>For more help please visit our <a href=\"http:\/\/www.varutra.com\">website.<\/a><\/p>\n<p>Author,<\/p>\n<p>Saketh Reddy Malepu<br \/>\nAttack &amp; Pentest Team<br \/>\nVarutra Consulting Pvt. Ltd.<\/p>","protected":false},"excerpt":{"rendered":"<p>What is OAuth? OAuth is a mechanism that is used by many companies like Amazon, Google, Microsoft, etc., which allows the user to view or&#8230;<\/p>\n","protected":false},"author":4,"featured_media":13227,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[259,272],"tags":[434,431,432,433,435],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.6.3 - aioseo.com -->\n\t\t<meta name=\"description\" content=\"Do you know what is Oauth and how it works? Read our article to know Oauth related vulnerabilities, and Entities used in OAuth2.0 and mitigation measures.\" \/>\n\t\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t\t<link rel=\"canonical\" href=\"https:\/\/www.varutra.com\/varutravrt3\/oauth-related-vulnerabilities\/\" \/>\n\t\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.6.3\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Varutra Consulting\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"OAuth Related Vulnerabilities and Entities in OAuth 2.0\" \/>\n\t\t<meta property=\"og:description\" content=\"Do you know what is Oauth and how it works? Read our article to know Oauth related vulnerabilities, and Entities used in OAuth2.0 and mitigation measures.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.varutra.com\/varutravrt3\/oauth-related-vulnerabilities\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/05\/OAuth-Related-Vulnerabilities-1.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/05\/OAuth-Related-Vulnerabilities-1.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"1060\" \/>\n\t\t<meta property=\"og:image:height\" content=\"593\" \/>\n\t\t<meta property=\"article:section\" content=\"Web Application Security\" \/>\n\t\t<meta property=\"article:tag\" content=\"authorization code\" \/>\n\t\t<meta property=\"article:tag\" content=\"oauth\" \/>\n\t\t<meta property=\"article:tag\" content=\"oauth2\" \/>\n\t\t<meta property=\"article:tag\" content=\"protocol\" \/>\n\t\t<meta property=\"article:tag\" content=\"web security\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2021-05-27T06:20:33+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2022-12-02T07:08:22+00:00\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:title\" content=\"OAuth Related Vulnerabilities and Entities in OAuth 2.0\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Do you know what is Oauth and how it works? Read our article to know Oauth related vulnerabilities, and Entities used in OAuth2.0 and mitigation measures.\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/05\/OAuth-Related-Vulnerabilities-1.png\" \/>\n\t\t<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t\t<meta name=\"twitter:data1\" content=\"kalpblogger\" \/>\n\t\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/oauth-related-vulnerabilities\\\/#article\",\"name\":\"OAuth Related Vulnerabilities and Entities in OAuth 2.0\",\"headline\":\"\\u201cOAuth\\u201d Related Vulnerabilities\",\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/OAuth-Related-Vulnerabilities-1.png\",\"width\":1060,\"height\":593,\"caption\":\"\\u201cOAuth\\u201d Related Vulnerabilities\"},\"datePublished\":\"2021-05-27T11:50:33+05:30\",\"dateModified\":\"2022-12-02T12:38:22+05:30\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/oauth-related-vulnerabilities\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/oauth-related-vulnerabilities\\\/#webpage\"},\"articleSection\":\"Authentication &amp; Authorization, Web Application Security, authorization code, oauth, oauth2, protocol, web security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/oauth-related-vulnerabilities\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"nextItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/oauth-related-vulnerabilities\\\/#listItem\"},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/oauth-related-vulnerabilities\\\/#listItem\",\"position\":2,\"name\":\"\\u201cOAuth\\u201d Related Vulnerabilities\",\"previousItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\"}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\",\"name\":\"Varutra\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Varutra-Found-e1612984024606.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/oauth-related-vulnerabilities\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/oauth-related-vulnerabilities\\\/#organizationLogo\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/\",\"name\":\"kalpblogger\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/oauth-related-vulnerabilities\\\/#authorImage\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5e96a9b330da7c941c1e39217a2fbe38?s=96&d=mm&r=g\",\"width\":96,\"height\":96,\"caption\":\"kalpblogger\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/oauth-related-vulnerabilities\\\/#webpage\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/oauth-related-vulnerabilities\\\/\",\"name\":\"OAuth Related Vulnerabilities and Entities in OAuth 2.0\",\"description\":\"Do you know what is Oauth and how it works? Read our article to know Oauth related vulnerabilities, and Entities used in OAuth2.0 and mitigation measures.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/oauth-related-vulnerabilities\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/OAuth-Related-Vulnerabilities-1.png\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/oauth-related-vulnerabilities\\\/#mainImage\",\"width\":1060,\"height\":593,\"caption\":\"\\u201cOAuth\\u201d Related Vulnerabilities\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/oauth-related-vulnerabilities\\\/#mainImage\"},\"datePublished\":\"2021-05-27T11:50:33+05:30\",\"dateModified\":\"2022-12-02T12:38:22+05:30\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"name\":\"Varutra Consulting\",\"description\":\"Secure your digital world with our Cybersecurity services.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>OAuth Related Vulnerabilities and Entities in OAuth 2.0<\/title>\n\n","aioseo_head_json":{"title":"OAuth Related Vulnerabilities and Entities in OAuth 2.0","description":"Do you know what is Oauth and how it works? Read our article to know Oauth related vulnerabilities, and Entities used in OAuth2.0 and mitigation measures.","canonical_url":"https:\/\/www.varutra.com\/varutravrt3\/oauth-related-vulnerabilities\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"og:locale":"en_US","og:site_name":"Varutra Consulting","og:type":"article","og:title":"OAuth Related Vulnerabilities and Entities in OAuth 2.0","og:description":"Do you know what is Oauth and how it works? Read our article to know Oauth related vulnerabilities, and Entities used in OAuth2.0 and mitigation measures.","og:url":"https:\/\/www.varutra.com\/varutravrt3\/oauth-related-vulnerabilities\/","og:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/05\/OAuth-Related-Vulnerabilities-1.png","og:image:secure_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/05\/OAuth-Related-Vulnerabilities-1.png","og:image:width":"1060","og:image:height":"593","article:section":"Web Application Security","article:tag":["authorization code","oauth","oauth2","protocol","web security"],"article:published_time":"2021-05-27T06:20:33+00:00","article:modified_time":"2022-12-02T07:08:22+00:00","twitter:card":"summary_large_image","twitter:title":"OAuth Related Vulnerabilities and Entities in OAuth 2.0","twitter:description":"Do you know what is Oauth and how it works? Read our article to know Oauth related vulnerabilities, and Entities used in OAuth2.0 and mitigation measures.","twitter:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/05\/OAuth-Related-Vulnerabilities-1.png","twitter:label1":"Written by","twitter:data1":"kalpblogger","twitter:label2":"Est. reading time","twitter:data2":"3 minutes","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.varutra.com\/varutravrt3\/oauth-related-vulnerabilities\/#article","name":"OAuth Related Vulnerabilities and Entities in OAuth 2.0","headline":"\u201cOAuth\u201d Related Vulnerabilities","author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/05\/OAuth-Related-Vulnerabilities-1.png","width":1060,"height":593,"caption":"\u201cOAuth\u201d Related Vulnerabilities"},"datePublished":"2021-05-27T11:50:33+05:30","dateModified":"2022-12-02T12:38:22+05:30","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/oauth-related-vulnerabilities\/#webpage"},"isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/oauth-related-vulnerabilities\/#webpage"},"articleSection":"Authentication &amp; Authorization, Web Application Security, authorization code, oauth, oauth2, protocol, web security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.varutra.com\/varutravrt3\/oauth-related-vulnerabilities\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/#listItem","position":1,"name":"Home","item":"https:\/\/www.varutra.com\/varutravrt3\/","nextItem":"https:\/\/www.varutra.com\/varutravrt3\/oauth-related-vulnerabilities\/#listItem"},{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/oauth-related-vulnerabilities\/#listItem","position":2,"name":"\u201cOAuth\u201d Related Vulnerabilities","previousItem":"https:\/\/www.varutra.com\/varutravrt3\/#listItem"}]},{"@type":"Organization","@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization","name":"Varutra","url":"https:\/\/www.varutra.com\/varutravrt3\/","logo":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Varutra-Found-e1612984024606.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/oauth-related-vulnerabilities\/#organizationLogo"},"image":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/oauth-related-vulnerabilities\/#organizationLogo"}},{"@type":"Person","@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author","url":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/","name":"kalpblogger","image":{"@type":"ImageObject","@id":"https:\/\/www.varutra.com\/varutravrt3\/oauth-related-vulnerabilities\/#authorImage","url":"https:\/\/secure.gravatar.com\/avatar\/5e96a9b330da7c941c1e39217a2fbe38?s=96&d=mm&r=g","width":96,"height":96,"caption":"kalpblogger"}},{"@type":"WebPage","@id":"https:\/\/www.varutra.com\/varutravrt3\/oauth-related-vulnerabilities\/#webpage","url":"https:\/\/www.varutra.com\/varutravrt3\/oauth-related-vulnerabilities\/","name":"OAuth Related Vulnerabilities and Entities in OAuth 2.0","description":"Do you know what is Oauth and how it works? Read our article to know Oauth related vulnerabilities, and Entities used in OAuth2.0 and mitigation measures.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#website"},"breadcrumb":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/oauth-related-vulnerabilities\/#breadcrumblist"},"author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"creator":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/05\/OAuth-Related-Vulnerabilities-1.png","@id":"https:\/\/www.varutra.com\/varutravrt3\/oauth-related-vulnerabilities\/#mainImage","width":1060,"height":593,"caption":"\u201cOAuth\u201d Related Vulnerabilities"},"primaryImageOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/oauth-related-vulnerabilities\/#mainImage"},"datePublished":"2021-05-27T11:50:33+05:30","dateModified":"2022-12-02T12:38:22+05:30"},{"@type":"WebSite","@id":"https:\/\/www.varutra.com\/varutravrt3\/#website","url":"https:\/\/www.varutra.com\/varutravrt3\/","name":"Varutra Consulting","description":"Secure your digital world with our Cybersecurity services.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"}}]}},"aioseo_meta_data":{"post_id":"13223","title":"OAuth Related Vulnerabilities and Entities in OAuth 2.0","description":"Do you know what is Oauth and how it works? Read our article to know Oauth related vulnerabilities, and Entities used in OAuth2.0 and mitigation measures.","keywords":[],"keyphrases":"{\"focus\":{\"keyphrase\":\"oauth\",\"analysis\":{\"keyphraseInTitle\":{\"title\":\"Focus keyphrase in SEO title\",\"description\":\"Focus keyphrase found in SEO title.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInDescription\":{\"title\":\"Focus keyphrase in meta description\",\"description\":\"Focus keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Focus keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":1},\"keyphraseInURL\":{\"title\":\"Focus keyphrase in URL\",\"description\":\"Focus keyphrase used in the URL.\",\"score\":5,\"maxScore\":5,\"error\":0},\"keyphraseInIntroduction\":{\"title\":\"Focus keyphrase in introduction\",\"description\":\"Your Focus keyphrase appears in the first paragraph. Well done!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInSubHeadings\":{\"title\":\"Focus keyphrase in Subheadings\",\"description\":\"Your H2 and H3 subheadings reflects the topic of your copy. Good job!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"title\":\"Focus keyphrase in image alt attributes\",\"description\":\"Focus keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}},\"score\":100},\"additional\":[]}","primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"featured","og_image_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/05\/OAuth-Related-Vulnerabilities-1.png","og_image_width":"1060","og_image_height":"593","og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":"Web Application Security","og_article_tags":[],"twitter_use_og":true,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":"{\"article\":{\"articleType\":\"BlogPosting\"},\"course\":{\"name\":\"\",\"description\":\"\",\"provider\":\"\"},\"faq\":{\"pages\":[]},\"product\":{\"reviews\":[]},\"recipe\":{\"ingredients\":[],\"instructions\":[],\"keywords\":[]},\"software\":{\"reviews\":[],\"operatingSystems\":[]},\"webPage\":{\"webPageType\":\"WebPage\"}}","pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"limit_modified_date":false,"open_ai":null,"created":"2021-10-27 15:11:20","updated":"2022-12-02 07:09:29"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\/category\/authentication-authorization\/\" title=\"Authentication &amp; Authorization\">Authentication &amp; Authorization<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t\u201cOAuth\u201d Related Vulnerabilities\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.varutra.com\/varutravrt3"},{"label":"Authentication &amp; Authorization","link":"https:\/\/www.varutra.com\/varutravrt3\/category\/authentication-authorization\/"},{"label":"\u201cOAuth\u201d Related Vulnerabilities","link":"https:\/\/www.varutra.com\/varutravrt3\/oauth-related-vulnerabilities\/"}],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/13223"}],"collection":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/comments?post=13223"}],"version-history":[{"count":5,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/13223\/revisions"}],"predecessor-version":[{"id":20283,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/13223\/revisions\/20283"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media\/13227"}],"wp:attachment":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media?parent=13223"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/categories?post=13223"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/tags?post=13223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}