Skip to content

Commit

Permalink
u
Browse files Browse the repository at this point in the history
  • Loading branch information
aeneasr committed Jul 28, 2022
1 parent 8a8ceb6 commit 69e9890
Show file tree
Hide file tree
Showing 2 changed files with 161 additions and 126 deletions.
28 changes: 12 additions & 16 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -7391,10 +7391,9 @@ Signed-off-by: Euan Kemp <[email protected]>
1. Malice initiates an OAuth 2.0 Authorization Code Flow:
https://hydra/oauth2/auth?client=...


- Hydra creates the consent request id and an additional CSRF token
which is stored in the database and the encrypted cookie. Malice
is not able to see the CSRF token.
- Hydra creates the consent request id and an additional CSRF token which
is stored in the database and the encrypted cookie. Malice is not able to
see the CSRF token.

2. Hydra redirects malice to the consent app and appends consent id
"example-id": https://consent-app/?consent=example-id
Expand Down Expand Up @@ -7669,10 +7668,9 @@ contains this patch does not require any code changes or deployment changes.
1. Malice initiates an OAuth 2.0 Authorization Code Flow:
https://hydra/oauth2/auth?client=...


- Hydra creates the consent request id and an additional CSRF token
which is stored in the database and the encrypted cookie. Malice
is not able to see the CSRF token.
- Hydra creates the consent request id and an additional CSRF token which
is stored in the database and the encrypted cookie. Malice is not able to
see the CSRF token.

2. Hydra redirects malice to the consent app and appends consent id
"example-id": https://consent-app/?consent=example-id
Expand Down Expand Up @@ -7965,10 +7963,9 @@ Signed-off-by: Euan Kemp <[email protected]>
1. Malice initiates an OAuth 2.0 Authorization Code Flow:
https://hydra/oauth2/auth?client=...


- Hydra creates the consent request id and an additional CSRF token
which is stored in the database and the encrypted cookie. Malice
is not able to see the CSRF token.
- Hydra creates the consent request id and an additional CSRF token which
is stored in the database and the encrypted cookie. Malice is not able to
see the CSRF token.

2. Hydra redirects malice to the consent app and appends consent id
"example-id": https://consent-app/?consent=example-id
Expand Down Expand Up @@ -8170,10 +8167,9 @@ contains this patch does not require any code changes or deployment changes.
1. Malice initiates an OAuth 2.0 Authorization Code Flow:
https://hydra/oauth2/auth?client=...


- Hydra creates the consent request id and an additional CSRF token
which is stored in the database and the encrypted cookie. Malice
is not able to see the CSRF token.
- Hydra creates the consent request id and an additional CSRF token which
is stored in the database and the encrypted cookie. Malice is not able to
see the CSRF token.

2. Hydra redirects malice to the consent app and appends consent id
"example-id": https://consent-app/?consent=example-id
Expand Down
Loading

0 comments on commit 69e9890

Please sign in to comment.