Skip to content

Commit 3c151a5

Browse files
Apply Mike's suggestions from code review
Co-authored-by: Michael B. Jones <[email protected]>
1 parent 0cba2a2 commit 3c151a5

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

A04_attacks-and-mitigations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ The attack described above works for the implicit grant as well. If
106106
the attacker is able to send the authorization response to an attacker-controlled URI, the attacker will directly get access to the fragment carrying the
107107
access token.
108108

109-
Additionally, implicit grants (and also other grants when using `response_mode=fragment` as defined in [@OpenID.MRT]) can be subject to a further kind of
109+
Additionally, implicit grants (and also other grants when using `response_mode=fragment` as defined in [@OAuth.Responses]) can be subject to a further kind of
110110
attack. It utilizes the fact that user agents re-attach fragments to
111111
the destination URL of a redirect if the location header does not
112112
contain a fragment (see [@!RFC9110], Section 17.11). The attack

B_references.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@
5353
</front>
5454
</reference>
5555

56-
<reference anchor="OpenID.MRT" target="https://openid.net/specs/oauth-v2-multiple-response-types-1_0.html">
56+
<reference anchor="OAuth.Responses" target="https://openid.net/specs/oauth-v2-multiple-response-types-1_0.html">
5757
<front>
5858
<title>OAuth 2.0 Multiple Response Type Encoding Practices</title>
5959
<author initials="B." surname="de Medeiros" fullname="Breno de Medeiros">

0 commit comments

Comments
 (0)