PayPal proffers patch for OAuth app hack hole

Payment giant takes second look at bad bugs.

2 Reg comments Got Tips?

Paypal has patched a phishing vulnerability that could allow attackers to steal any OAuth token for its payment apps and gain access to accounts.

Adobe software engineer and OAuth wonk Antonio Sanso discovered the token request flaw after messing with redirect URLs.

He found PayPal's authorisation server setup to handle OAuth token requests via the developer Dashboard could be manipulated to accept localhost as a redirect_uri where tokens should be shipped.

Sanso showcased the redirect_uri flaw by altering requests made by the Paypal OAuth demonstration app, which set the actual registered redirect_uri to

He then inked a DNS entry for to capture requests

"So it really looks like that even if Paypal did actually perform exact matching validation, localhost was a magic word and it override the validation completely," Sanso says.

PayPal squashed the bug earlier this month after initially deciding it was not a vulnerability in September.

Sanso reported similar redirect_uri bugs to Facebook in 2014 to steal OAuth access tokens.

He says developers using OAuth must register full exact redirect_uri addresses with no second stage redirects to protect their apps. ®


Biting the hand that feeds IT © 1998–2020