In a previous post,
I described a pass-the-permission-ticket vulnerability in UMA 2.0
in which a malicious UMA resource server
could kindly ask a UMA client
to give it access tokens actually intended for another UMA resource server.
In this post,
I am describing a similar attack when the authorization server is malicious.
Pass-the-permission-ticket vulnerability in UMA 2.0
Published:
In the User-Managed Access (UMA) 2.0 protocol,
a malicious resource server (or a malicious server acting as a resource server)
can obtain a requesting party (access) token (RPT)
intended for another UMA resource server
from a UMA client
by passing a permission ticket obtained from the target resource server to the UMA client.
This can compromise the privacy (confidentiality)
and integrity of UMA protected resources.