A hostile party could impersonate the client site and get access to the authorization 'code'. This could be achieved using DNS or ARP spoofing. This applies to clients, which are web applications; thus, the redirect URI is not local to the host where the user's browser is running.
OAuth 2.0 Threat Model and Security Considerations (RFC6819, section 4.4.1.5)
This threat is considered fully mitigated if all the test cases from the following test set succeed.
The impact factor is a measure that indicates how important a given countermeasure is towards mitigating a threat.
Back to the threat overview