Leakage from the Authorization Server

An attacker can learn 'state' from the authorization request if the authorization endpoint at the authorization server contains links or third-party content.

OAuth 2.0 Security Best Current Practice (SecBCP, section 4.2.2)


This threat is considered fully mitigated if all the test cases from one of the following test sets succeed.

Back to the threat overview