You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: A04_attacks-and-mitigations.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -106,7 +106,7 @@ The attack described above works for the implicit grant as well. If
106
106
the attacker is able to send the authorization response to an attacker-controlled URI, the attacker will directly get access to the fragment carrying the
107
107
access token.
108
108
109
-
Additionally, implicit grants (and also other grants when using `response_mode=fragment` as defined in [@OpenID.MRT]) can be subject to a further kind of
109
+
Additionally, implicit grants (and also other grants when using `response_mode=fragment` as defined in [@OAuth.Responses]) can be subject to a further kind of
110
110
attack. It utilizes the fact that user agents re-attach fragments to
111
111
the destination URL of a redirect if the location header does not
112
112
contain a fragment (see [@!RFC9110], Section 17.11). The attack
0 commit comments