More guidelines than rules: CSRF vulnerabilities from noncompliant oauth 2.0 implementations

36Citations
Citations of this article
28Readers
Mendeley users who have this article in their library.
Get full text

Abstract

OAuth 2.0 provides an open framework for the authorization of users across the web. While the standard enumerates mandatory security protections for a variety of attacks, many embodiments of this standard allow these protections to be optionally implemented. In this paper, we analyze the extent to which one particularly dangerous vulnerability, Cross Site Request Forgery, exists in real-world deployments. We crawl the Alexa Top 10, 000 domains, and conservatively identify that 25% of websites using OAuth appear vulnerable to CSRF attacks. We then perform an in-depth analysis of four high-profile case studies, which reveal not only weaknesses in sample code provided in SDKs, but also inconsistent implementation of protections among services provided by the same company. From these data points, we argue that protection against known and sometimes subtle security vulnerabilities can not simply be thrust upon developers as an option, but instead must be strongly enforced by Identity Providers before allowing web applications to connect.

Cite

CITATION STYLE

APA

Shernan, E., Carter, H., Tian, D., Traynor, P., & Butler, K. (2015). More guidelines than rules: CSRF vulnerabilities from noncompliant oauth 2.0 implementations. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9148, pp. 239–260). Springer Verlag. https://doi.org/10.1007/978-3-319-20550-2_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free