51°F

Aaron Parecki

  • Articles
  • Notes
  • Photos
  • Brandon Trebitowski https://brandontreb.com   •   Mar 3

    True, but it would be tricky.

    Wouldn’t the attacker have find a way to extract the code_verifier from local storage and pass it along with the hijacked redirect?

    They would have to somehow have the ability to write custom js code on the path they are redirecting to. I guess this is possible on sites that don’t sanitize user inputs.

    Aaron Parecki
    I was thinking the attacker makes up their *own* `code_verifier` and injects that into the first open redirect
    Portland, Oregon • 42°F
    Thu, Mar 2, 2023 4:16pm -08:00
    1 reply
    • Brandon Trebitowski brandontreb.com

      You just blew my mind. So that basically defeats PKCE?

      Thu, Mar 2, 2023 4:25pm -08:00
Posted in /replies using monocle.p3k.io

Hi, I'm Aaron Parecki, Director of Identity Standards at Okta, and co-founder of IndieWebCamp. I maintain oauth.net, write and consult about OAuth, and participate in the OAuth Working Group at the IETF. I also help people learn about video production and livestreaming. (detailed bio)

I've been tracking my location since 2008 and I wrote 100 songs in 100 days. I've spoken at conferences around the world about owning your data, OAuth, quantified self, and explained why R is a vowel. Read more.

  • Director of Identity Standards at Okta
  • IndieWebCamp Founder
  • OAuth WG Editor
  • OpenID Board Member

  • 🎥 YouTube Tutorials and Reviews
  • 🏠 We're building a triplex!
  • ⭐️ Life Stack
  • ⚙️ Home Automation
  • All
  • Articles
  • Bookmarks
  • Notes
  • Photos
  • Replies
  • Reviews
  • Trips
  • Videos
  • Contact
© 1999-2025 by Aaron Parecki. Powered by p3k. This site supports Webmention.
Except where otherwise noted, text content on this site is licensed under a Creative Commons Attribution 3.0 License.
IndieWebCamp Microformats Webmention W3C HTML5 Creative Commons
WeChat ID
aaronpk_tv