17OAUTH VULNERABILITIES
OAuth is an open protocol that simplifies and standardizes secure authorization on web, mobile, and desktop applications. It allows users to create accounts on websites without having to create a username or password. It’s commonly seen on websites as the Sign in with platform button like the one shown in Figure 17-1, where the platform is Facebook, Google, LinkedIn, Twitter, or so on.
Figure 17-1: Example OAuth Sign in with Google button
OAuth vulnerabilities are a type of application configuration vulnerability, meaning ...
Get Real-World Bug Hunting now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.