If access tokens are sent via URI query parameters, such tokens may leak to log files and the HTTP 'referer'.
OAuth 2.0 Threat Model and Security Considerations (RFC6819, section 4.6.7)
This threat is considered fully mitigated if all the test cases from the following test set succeed.
Back to the threat overview