Mixing up Public and Private Keys in OpenID Connect deployments

Hanno's Blog

Tuesday, February 25. 2025

Mixing up Public and Private Keys in OpenID Connect deployments


Trackbacks

No Trackbacks

Comments
Display comments as (Linear | Threaded)

Thanks for your research on this!

I have a small addition to the “Impact” section: Some OpenID Providers also double as plain OAuth Authorization Servers, and probably most of them also use the same signing keys to sign the OAuth access tokens – A profile of this was specified in retrospect in RFC 9068.

If an attacker is able to create access tokens on his own, he can also impersonate any user at any API / resource accepting those tokens.
#1 Julius (Homepage) on 2025-02-25 20:58 (Reply)

Add Comment

E-Mail addresses will not be displayed and will only be used for E-Mail notifications.
 
 

About

This blog is written by Hanno Böck. Unless noted otherwise, its content is licensed as CC0.

You can find my web page with links to my work as a journalist here.

I am also publishing a newsletter about climate change and decarbonization technologies.

The blog uses the free software Serendipity and is hosted at schokokeks.org.

Hanno on Mastodon | Contact / Imprint | Privacy / Datenschutz