This threat is applicable if the authorization server stores refresh tokens as handles in a database. An attacker may obtain refresh tokens from the authorization server's database by gaining access to the database or launching a SQL injection attack.
OAuth 2.0 Threat Model and Security Considerations (RFC6819, section 4.5.2)
This threat is considered fully mitigated if all the test cases from the following test set succeed.
The impact factor is a measure that indicates how important a given countermeasure is towards mitigating a threat.
Back to the threat overview