identity-provider

3 articles
sort: new top best
clear filter
0 8/10

Authentication bypass on Airbnb via chained OAuth vulnerabilities: an HTTP Referer-based open redirect in the OAuth callback endpoint combined with login CSRF allowed attackers to steal OAuth access tokens from identity providers (Facebook/Google) and authenticate as victims on both web and mobile applications. The attack exploited Airbnb's use of long-term identity provider access tokens for mobile app authentication combined with weak referer-based redirect logic.

Airbnb Facebook Google Arne Swinnen Frans Rosén
arneswinnen.net · devanshbatham/Awesome-Bugbounty-Writeups · 4 hours ago · details
0 9/10

Uber's SSO system based on shared session cookies across *.uber.com subdomains was vulnerable to authentication bypass via a combination of subdomain takeover on saostatic.uber.com (dangling CloudFront CNAME) and session cookie theft through CSRF token relay attacks. An attacker could compromise any *.uber.com subdomain to steal the '_csid' shared session cookie and relay CSRF tokens to impersonate authenticated users across all Uber subdomains.

Uber Amazon CloudFront saostatic.uber.com auth.uber.com Arne Swinnen Frans Rosén Jack Whitton
arneswinnen.net · devanshbatham/Awesome-Bugbounty-Writeups · 4 hours ago · details
0 6/10

A technical guide to setting up Pocket ID, a lightweight OIDC identity provider focused on passkey-based authentication, as a simpler alternative to Keycloak for self-hosted services. The author covers installation, client configuration patterns, and integration with multiple self-hosted applications including Gitea, Argo CD, Grist, Sentry, n8n, and WordPress.

Pocket ID Keycloak Gitea Argo CD Grist Sentry n8n WordPress YubiKey Jonathan Daggerhart Cameron Eagans oauth2-proxy siemens/sentry-auth-oidc openid-connect-generic
cweagans.net · cweagans · 1 day ago · details · hn