NEW FEATURE
Cobalt PtaaS + DAST combines manual pentests and automated scanning for comprehensive applications security.
NEW FEATURE
Cobalt PtaaS + DAST combines manual pentests and automated scanning for comprehensive applications security.

OAuth Vulnerabilites Pt. 2

OAuth is a widely-used protocol that enables users to authorize third-party applications to access their data from other services, such as social media or cloud storage. However, like any technology, OAuth is not immune to vulnerabilities. This is Pt. 2 of a two-part series by Core Pentester Shubham Chaskar.

Hello again, Welcome to the second part of the blog series "OAuth Vulnerabilities." Here we will see the common vulnerabilities in OAuth. Read OAuth Vulnerabilites part 1.

The OAuth client must protect a few things. An organization must ensure that client secrets are in a safe place that others cannot access.

CSRF attack against the client

An attacker uses CSRF to execute an unwanted action on a user's browser by requesting a website where the user is logged in. With the help of an example attack, we will demonstrate this attack. Using a state parameter to prevent CSRF is highly recommended.

To better secure systems, consider using an OAuth client that supports authorization codes. When an OAuth callback endpoint receives a code parameter, the client trades it for an access token. The client passes the access token to the resource server when calling an API on behalf of the resource owner. Attackers can start an OAuth flow and obtain an authorization code from the target authorization server, stopping their "OAuth flow." A malicious attacker exploits a victim's client by consuming the attacker's authorization code. Attackers accomplish this by creating a malicious website.

On his website, something like:

<iframe src="https://ouauthclient.com/callAback?code=ATTACKER_CODE"></iframe>

To mitigate this, OAuth clients pass unguessable state parameters to authorization servers. An authorization server must return this value to the redirect URI as a parameter. Whenever the redirect URI is called, the client checks the state parameter. If the value passed initially does not match or is absent, a client terminates the flow with an error. This prevents attackers from injecting authorization codes into a victim's computer without their knowledge.

Attack scenario

By attaching your social media profile, you can log in to the following test website via OAuth instead of using your username and password. An attacker can manipulate the OAuth flow to gain access to other users' accounts because of the client application's insecure implementation of the OAuth flow.

Once we click "Attach a social account," it will link the social media account to the profile.

oauth-vulnerabilites-example-1

An attacker will log in with the credentials and capture the request linking the account. The request will contain the OAuth code.

oauth-vulnerabilites-example-2

Once the code generates, the attacker will drop the request, which is required not to attach the account to the profile. An attacker will create a simple HTML file with the above IMG tag and host the file on the server. 

Once visited by the victim, it will get attached to the victim's account.

Other things you can check include:

  • Entropy verification 
  • Reuse of check state isn't allowed 
  • Make sure the request is invalid by removing the state and URI

OAuth account hijacking via redirect_uri

In addition to targeting the access token, this attack targets the authorization code. An attacker can steal a valid code or token to access the victim's data. A compromised account can lead to the attacker being able to access all applications registered with this OAuth service as the victim. To understand this attack, you should understand how browsers handle the URI fragment after the # in HTTP redirect responses (HTTP 301/302 responses).

Attack scenario

The following test website allows users to log in with their social media accounts. A misconfiguration by the OAuth provider makes it possible for an attacker to steal authorization codes associated with other users' accounts.

Redirecting users to their original location after login is a common scenario on a website. If the user does not log in when they visit their app at "https://cobalt.io/app," the application redirects them to the login page. Once the user has logged in, the app will redirect them to https://cobalt.io/app.

After authorization, sensitive data, like an access token, is appended to the URL using the "redirect_uri." Consider a case where the redirect_uri can redirect to an attacker's server. When that happens, an attacker can access the victim's data using the access token.

After starting the OAuth flow, you can change the "redirect_uri" value to the attacker control website.

oauth-vulnerabilites-example-3

You will redirect to the attacker's control website (evil.com). This code will allow the attacker to complete the OAuth flow and control the victim's account.

oauth-vulnerabilites-example-4

In cases where the redirect URI accepts external URLs, such as accounts.google.com, use a redirector to get to any site you want: https://accounts.google.com/signout/chrome/landing?continue=https://appengine.google.com/_ah/logout?continue%3Dhttp://attacker:1337

There are lots of regular bypasses you can use

    • http://example.com%2f%2f.victim.com
    • http://example.com%5c%5c.victim.com
    • http://example.com%3F.victim.com
    • http://example.com%23.victim.com
    • http://victim.com:80%40example.com
    • http://victim.com%2eexample.com

Weak Authorization Codes

Authentication bypass via implicit flow

Due to the dangers of sending access tokens via the browser, implicit grants are recommended for single-page applications. Because it is relatively simple, it is also commonly used in traditional client-server applications. A client application receives an access token from an OAuth service via an HTTP URL fragment. To access the token, the client application uses JavaScript. For the application to maintain the session after the user closes the page, somebody must store user data (usually a user ID and access token).

To solve this problem, you can send this information as a POST request to the server and assign a session cookie to the user.

A simple change in the parameters sent to the server can allow an attacker to impersonate any user. As part of the implicit flow, attackers access this POST request through their browsers. This behavior can lead to a severe security vulnerability if the client application fails to ensure that the access token matches the rest of the request data.

Attack scenario

The following test website allows users to log in with their social media accounts. An attacker can log into an account without knowing the password of another user due to inadequate validation by the client application.

By starting the OAuth flow, notice that the client application (the blog website) receives some basic information about the user from the OAuth service.

oauth-vulnerabilites-example-5

Upon receiving this information, it sends a POST request, and the access token to its own /authenticates endpoint.

By changing the email address to the victim's account, an attacker can log in to the victim's account using the attacker's access token.

oauth-vulnerabilites-example-6

An attacker is now logged in to the victim's account.

oauth-vulnerabilites-example-7

SSRF via OpenID dynamic client registration

OpenID Connect

OpenID Connect 1.0 is a simple identity layer on the OAuth 2.0 protocol. While OAuth 2.0 is about resource access and sharing, OIDC is about user authentication. It allows Clients to verify the identity of the End-User based on the authentication performed by an Authorization Server, as well as to obtain basic profile information about the End-User in an interoperable and REST-like manner.

The OpenID specification outlines a standardized way of allowing client applications to register with the OpenID provider. If dynamic client registration is supported, the client application can register by sending a POST request to a dedicated /registration endpoint.

Attack scenario

An OAuth registration endpoint is available on the following test website, allowing dynamic registration via client applications. There's a potential vector for SSRF due to the OAuth service's unsafe use of client-specific data.

After the Initial recon, we can find the configuration file that can give us the endpoint for the registration.

oauth-vulnerabilites-example-8

You can create a suitable POST request to register your client application with the OAuth service. You must provide a redirect_uris array containing an arbitrary whitelist of callback URIs for your fake application.

oauth-vulnerabilites-example-9

We know from the OpenID specification that client applications can provide the URL for their logo using the logo_uri property during dynamic registration. This client id can fetch the logo for the specific client.

Go back to the POST /reg request in Repeater and replace the current logo_uri value with the target URL:

"logo_uri" : "http://169.254.169.254/latest/meta-data/iam/security-credentials/admin/"

oauth-vulnerabilites-example-10 

Now visit the logo for the client ID mentioned in response to get the access token from the AWS manager.

oauth-vulnerabilites-example-11

Invalidate authorization code after use.

When used authorization codes are invalidated, attackers have to use captured or guessed authorization codes within a specific timeframe.

Attack scenario

Intercept the request sent by the OAuth 2.0 client to the OAuth 2.0 Authorization Endpoint by configuring BurpSuite.

oauth-vulnerabilites-example-12

Please send it to BurpSuite Repeater. Try that request again in the Repeater and see if it works.

oauth-vulnerabilites-example-13

Credential Leakage

As part of OAuth, you may include the authorization code, the code challenge, and the code verifier in your URL. If the response_mode isn't set to form_post, the implicit flow sends the authorization token with the URL. The referrer header, log files, and proxy may leak the requested token or code. It's because these parameters are either passed in the query or fragment.

You can test this scenario by intercepting OAuth traffic with an HTTP interceptor like Burpsuite.

1. Check the URL for credentials and proceed with the authorization process.

2. Analyze the requests made to any external resources included in an OAuth flow. The referrer header could leak credentials.

Mitigation

One of the critical issues with OAuth is the general need for built-in security features. The security relies almost entirely on developers using the correct configuration options and implementing additional security measures, such as robust input validation.

It is important to note that vulnerabilities can arise in the client application and the OAuth service. 

For OAuth service providers

  • redirect_uri validation: Only allow complete and exact matches rather than pattern matching. This prevents attackers from accessing other pages on the allowed domains.
  • Enforce state parameter: Unguessable, random value can help protect users against CSRF-like attacks.
  • access_token and client_id validation: verify that the access token was issued to the same client_id making the request.
  • Scope validation: Check the requested scope to ensure that this matches the scope for which the token was initially granted.

For OAuth client applications

  • state parameter: Use it even though it is not mandatory.
  • client_secret alternative: If the mobile or native desktop OAuth client applications are developed, use the PKCE (RFC7638) mechanism to provide additional protection against access code interception or leakage.
  • Be careful with authorization codes: they may be leaked via Referer headers when external images, scripts, or CSS content is loaded. It is also important not to include them in the dynamically generated JavaScript files as they may be executed from external domains via <script> tags.
  • Send a redirect_uri parameter not only to the /authorization endpoint but also to the /token endpoint.
  • If you use the OpenID Connect id_token, ensure it is correctly validated according to the JSON Web Signature, JSON Web Encryption, and OpenID specifications.

References

Cobalt Core Secret Sauce CTA Image 2022

Back to Blog
About Shubham Chaskar
Shubham Chaskar is a core pentester with extensive experience as an application security engineer. He has certifications including CEH, eCPPTv2, and eWPTXv2. He has experience penetration testing with mobile apps, web applications, networks, cloud configurations, and thick-client apps. Bash, Python, Go, and PowerShell are his favorite programming languages to automate penetration testing. More By Shubham Chaskar
Cobalt Pentest Case Study: OAuth Redirect to Account Takeover
Cobalt Core Penteser Edu Garcia recently used an interesting attack method while working on a Cobalt pentest. In this blog, he shares how he did it and provides a solution to the vulnerability.
Blog
Aug 31, 2022
A Pentester’s Guide to Command Injection
Get expert insights with a command injection tutorial with insights from pentesting experts at Cobalt, a Pentest as a Service (PtaaS) provider.
Blog
Dec 11, 2020
Pentester Spotlight: Arun
Arun has been a part of Cobalt's Core since April 2016. He is a big advocate of the Core's continuous learning and is a vocal member of the community.
Blog
May 24, 2022