This threat is applicable if the authorization server stores refresh tokens as handles in a database. An attacker may obtain refresh tokens from the authorization server's database by gaining access to the database or launching a SQL injection attack.
OAuth 2.0 Threat Model and Security Considerations (RFC6819, section 4.5.2)
This threat is considered fully mitigated if all the test cases from the following test set succeed.
Back to the threat overview