<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[OAuth account takeover doesn&#x27;t need leaked tokens.]]></title><description><![CDATA[<p>OAuth account takeover doesn't need leaked tokens. No state param = CSRF to forced account linking. Loose redirect_uri matching = code theft via open redirect chains. Implicit flow puts tokens in browser history and Referer headers. PKCE bypass when not enforced server-side. SSRF via OpenID dynamic client registration. Six patterns, all with labs. <a href="https://www.kayssel.com/newsletter/issue-43/" rel="nofollow noopener"><span>https://www.</span><span>kayssel.com/newsletter/issue-4</span><span>3/</span></a> <a href="https://infosec.exchange/tags/OAuth" rel="tag">#<span>OAuth</span></a>  <a href="https://infosec.exchange/tags/BugBounty" rel="tag">#<span>BugBounty</span></a> <a href="https://infosec.exchange/tags/Pentesting" rel="tag">#<span>Pentesting</span></a>  <a href="https://infosec.exchange/tags/websecurity" rel="tag">#<span>websecurity</span></a>  <a href="https://infosec.exchange/tags/Offsec" rel="tag">#<span>Offsec</span></a>  <a href="https://infosec.exchange/tags/InfoSec" rel="tag">#<span>InfoSec</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/4dd5d45d-6cd0-407d-9e97-575ef5e45cce/oauth-account-takeover-doesn-t-need-leaked-tokens.</link><generator>RSS for Node</generator><lastBuildDate>Mon, 06 Apr 2026 04:02:42 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/4dd5d45d-6cd0-407d-9e97-575ef5e45cce.rss" rel="self" type="application/rss+xml"/><pubDate>Sun, 29 Mar 2026 08:44:21 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to OAuth account takeover doesn&#x27;t need leaked tokens. on Mon, 30 Mar 2026 06:55:07 GMT]]></title><description><![CDATA[<p><span><a href="/user/rsgbengi%40infosec.exchange">@<span>rsgbengi</span></a></span> Hey. Thanks for the writeup. I feel like there is either an error or a missing attack type in the redirect_uri section, when it comes to subdomain confusion. The trick I know is using the entire domain as a subdomain to your own domain, so to use legitimate.com.evil.com as the redirect_uri to attack a wildcard like legitimate.com* (without a slash before the wildcard).</p><p>I'm not aware of any OAuth issues that would allow you to add an extra subdomain to a redirect URI - is that a thing as well? Keycloak does not expand wildcards that aren't the final character of the redirect URI, so *.legitimate.com would not be a working wildcard, but other implementations may differ.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/hacksilon/statuses/116316812550300365</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/hacksilon/statuses/116316812550300365</guid><dc:creator><![CDATA[hacksilon@infosec.exchange]]></dc:creator><pubDate>Mon, 30 Mar 2026 06:55:07 GMT</pubDate></item></channel></rss>