You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When intercepting a request(), request-oauthlib doesn't take payload data passed with json parameter into account. This leads to kwargs having json parameter value.
Notice that the same kwargs are passed to refresh_token() call. The data then is included in the body data to be sent to the identity provider's refresh token endpoint.
Security Problem
As of requests2.4.2 POST data can be sent with json parameter. The data might include private information as it is intended for the POST body. The data then is further exposed to an identity provider when refreshing expired tokens if auto_refresh functionality is enabled while instantiating an OAuth2Session instance.
For the users
You can safely use data parameter to pass your POST data instead of json.
The text was updated successfully, but these errors were encountered:
Hi,
Thanks for the report, however I have difficulties to understand a concrete example and possible dev mistakes which can lead to info leaking. Based on the code highlights, it seems json is not used when calling requests library, no matter the content of kwargs.
Even though this is a bit old, I might be able to help explain as I've just encountered the same issue.
With requests, we're able to use the json argument as a shortcut, like this:
requests.post(MY_URL, json={"foo": "bar"})
Now we can also use the same format to call OAuth2Session.post, and it will work just fine. That is, until the provided token expires. To understand why, if we examine the OAuth2Session.request method signature:
You can see that if we call with data, it gets extracted and removed from kwargs. But, if we call with json, that parameter will not be removed from kwargs, and will be kept around. Now, take a look at how the refresh_token method is called from within:
So, the value for json will get passed into refresh_token. This is a problem, as the kwargs in that method will get added to the payload sent to the refresh token endpoint.
I encountered this issue while working with Microsoft's OAuth2 token endpoint. It fails with a 400 error if additional values are passed in to the endpoint's body.
Let me know if that makes sense, happy to elaborate if needed.
Walkthrough
When intercepting a
request()
,request-oauthlib
doesn't take payload data passed withjson
parameter into account. This leads tokwargs
havingjson
parameter value.Notice that the same kwargs are passed to
refresh_token()
call. The data then is included in the body data to be sent to the identity provider's refresh token endpoint.Security Problem
As of
requests
2.4.2
POST data can be sent withjson
parameter. The data might include private information as it is intended for the POST body. The data then is further exposed to an identity provider when refreshing expired tokens ifauto_refresh
functionality is enabled while instantiating anOAuth2Session
instance.For the users
You can safely use
data
parameter to pass your POST data instead ofjson
.The text was updated successfully, but these errors were encountered: