Reflected XSS in OAuth Callback Endpoint
在测试target.com的OAuth实现时发现了一个反射型XSS漏洞。该漏洞发生在应用未对用户输入进行验证和编码的情况下,导致浏览器执行恶意代码。由于通过URL传播,在钓鱼攻击中尤其危险。当出现在OAuth回调等敏感端点时,可能导致会话劫持和令牌窃取等严重后果。 2025-12-15 08:34:56 Author: infosecwriteups.com(查看原文) 阅读量:7 收藏

Ehtesham Ul Haq

Free Article Link: Click for free!

Press enter or click to view image in full size

Hello readers,

While testing an OAuth implementation on target.com, I came across a reflected XSS vulnerability that I found interesting and worth sharing. Even though XSS is one of the older web security issues, it still pops up in modern applications — and when it hits authentication flows like OAuth, it can have serious consequences.

In this article, I’ll walk you through what I found, why it’s important, and how it could be exploited if left unpatched.

Understanding Reflected XSS

Reflected cross-site scripting happens when an application takes user-supplied input and includes it in the page without proper validation or encoding. The input is then interpreted by the browser as executable code.

Unlike stored XSS, which persists on the server, reflected XSS is “instantaneous” — it executes as soon as someone clicks a crafted link. Because it’s often delivered via URLs, it’s especially dangerous in phishing attacks: a malicious URL can appear to be part of a trusted site, tricking users into executing scripts in their browser.

When this kind of vulnerability appears in sensitive endpoints like OAuth callbacks, attackers could potentially hijack sessions, steal tokens, or…


文章来源: https://infosecwriteups.com/reflected-xss-in-oauth-callback-endpoint-77ef41c0b011?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh