BCP_4_2_2

Leakage from the Authorization Server

An attacker can learn state from the authorization request if the authorization endpoint at the authorization server contains links or third-party content.

OAuth 2.0 Security Best Current Practice (draft 25) (SecBCP, section 4.2.2)

Mitigations

This threat is considered fully mitigated if all the test cases from one of the following test sets succeed.

Back to the threat overview