SlideShare a Scribd company logo
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 4 Issue 4, June 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD31319 | Volume – 4 | Issue – 4 | May-June 2020 Page 997
Flaws in Oauth 2.0: Can Oauth be used as a Security Server
Pooja Krushna Paste, Pratik Ramakant Vaidya
Department of MCA, ASM Institute of Management & Computer Studies, Thane, Maharashtra, India
ABSTRACT
OAuth 2.0 is the business standard convention for approval. OAuth 2.0
spotlights on customer engineer straightforwardness while giving explicit
approval streams to web applications,work area applications,cell phones,and
lounge room gadgets. The scientists analyzed 600 top U.S. also, ChAndroid
versatile applications that utilization OAuth 2.0 APIs from Facebook, Google
and Sina—which works Weibo in China—and backing SSO for outsider
applications. The scientists found that 41.2 percent of the applications they
tried were defenseless against their attackinese.
KEYWORDS: OAuth, Proxy Servers, Vpns, Authorization tokens
How to cite this paper: Pooja Krushna
Paste | Pratik Ramakant Vaidya "Flaws in
Oauth 2.0: Can Oauth be used asa Security
Server" Published in
International Journal
of Trend in Scientific
Research and
Development
(ijtsrd), ISSN: 2456-
6470, Volume-4 |
Issue-4, June 2020,
pp.997-999, URL:
www.ijtsrd.com/papers/ijtsrd31319.pdf
Copyright © 2020 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
1. INTRODUCTION
The OAuth 2.0 convention is one of the most broadly sent
approval/single sign-on (SSO) conventionsandfurthermore
fills in as the establishment for the new SSO standard
OpenID Connect. Notwithstanding the notorietyofOAuth, so
far examination endeavors were generally focused at
discovering bugs in explicit executions and depended on
formal models which conceptual from many webs includes
or didn't give a proper treatment by any stretch of the
imagination. In this paper, we do the primary broad
conventional examination of the OAuth 2.0 standard in an
expressive web model. Our investigation targets setting up
solid approval, verification, and meeting uprightness
ensures, for which we give formal definitions. In our proper
investigation, each of the four OAuth Grant Types (approval
code award, certain award, asset Owner Password
Credentials Grant, and the customer Credentials Grant) are
secured. They may even run all the while in the equivalent
and distinctive depending gatherings and Identity Provider
(IDP), where noxious depending parties, personality
suppliers, and programs are considered also. Our
demonstrating and examination of the OAuth 2.0 standard
expect that security proposals and Best Practices are
followed, so as to stay away from clear and known assaults.
2. OAuth Review-
The OAuth and Google Sign-In connecting type includes
Google Sign-In top of OAuth based record connecting. This
gives consistent voicebased connecting to Google clients
while likewise empowering account connecting for clients
who enrolled to your administration with a non-Google
personality. This connecting type starts with Google
Sign-In, which permits you to check if the client's Google
profile data exists in your framework. In the event that the
client's data isn't found in your framework, a standard
OAuth stream starts. The client can likewise decide to make
another record with their Google profile data
I. OAuth Used by Facebook-
267 million Facebook users' data has supposedly been
leaked. Comparitech and security analyst Bob Diachenko
have revealed a database containing in excess of 267 million
Facebook users' data that was left uncovered on the web,
with not so much as a secret key forestalling unapproved
access to it. On the off chance that you've at any point
utilized a "Sign in With Facebook" catch, orgivenanoutsider
application access to your Twitter account, you've utilized
OAuth. It's additionally utilized by Google, Microsoft, and
LinkedIn, just as numerous other recordsuppliers.Basically,
OAuth permits you to concede a site access to some data
about your record without giving it your genuine record
secret key.
IJTSRD31319
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31319 | Volume – 4 | Issue – 4 | May-June 2020 Page 998
II. OAuth used by Google-
Google APIs utilize the OAuth 2.0 convention for
confirmation and approval. Google bolsters regular OAuth
2.0 situations, for example, those for web server, customer
side, introduced, and constrained information gadget
applications. To start, acquire OAuth 2.0 customer
accreditations from the Google API Console. At that point
your customer application demands an entrance tokenfrom
the Google Authorization Server, extricates a token from the
reaction, and sends the token to the Google API that you
need to get to. For an intelligent exhibitofutilizingOAuth 2.0
with Google (counting the alternative to utilize your own
customer qualifications), try different things withtheOAuth
2.0 Playground.
III. Games that use OAuth-
This record clarifies how applicationsintroducedongadgets
like telephones, tablets, and PCs utilize Google's OAuth 2.0
endpoints to approve access to Google APIs. OAuth 2.0
permits clients to impart explicit information to an
application while keeping their usernames, passwords, and
other data private. For instance, an application can utilize
OAuth 2.0 to get consent from clients to store records in
their Google Drives. Introduced applications are
disseminated to singular gadgets, and it is accepted that
these applications can't keep insider facts. They can get to
Google APIs while the client is available at the application or
when the application is running out of sight. This approval
stream is like the one utilized for web server applications.
The fundamental contrast is that introduced applications
must open the framework program and gracefully a
neighborhood divert URI to deal with reactions from
Google's approval server.
Linking games with your google play store account has
always been secure but what if we starttolink anothersocial
media app with the application currently using than it may
result in data lose or even by using proxy server s can be
used to present a user a fake identity. Or an attacker can
use another username and can log into the game as another
user.
IV. Less Risks with short time
tokens-Divert URLs are a basic piece of the OAuth stream.
After a client effectively approves an application, the
approval server will redirect the client back to the
application with either an approval code or access token in
the URL. Because of approval sidestep in redirect Uri
parameter in OAUTH stream; it’s conceivable to divert
confirmed clients to subjective spaces with their OAuth
accreditations from which it’s conceivable to take over their
record. On the off chance that an approval code is utilized
more than once, the approval server MUST deny the
solicitation. OAuth Providers (servers) that carefully follow
rfc6749 are defenseless against open divert. Approval
repudiated doesn't send an alarm.
V. What Goes in a token Granted-
request scope: contacts.
response type: code (implicit or others).
callback URL.
client Id
3. Literature review
Redirect URLs are a fundamental bit of the OAuth stream.
After a customer viably supports an application, the
endorsement server will redirect the customer back to the
application with either an endorsementcodeoraccesstoken
in the URL. As a result of endorsement avoid in redirect Uri
parameter in OAUTH stream, it’s possibletooccupyaffirmed
customers to emotional spaces with their OAuth
accreditations from which it’s possible to take over their
record. In case an endorsement code is usedmorethanonce,
the endorsement server MUST deny the requesting. OAuth
Providers (servers) that cautiously follow rfc6749 are
vulnerable against open occupy. Endorsement renounced
doesn't send an alert.
4. Research Methodology-
OAuth is being used widely for authorization but it is said
that It is not so far god for authentication. And thus, now
they use a (sso) that is a single sign on. The sso resides as a
thin layer above the OAuth. But now let’s take a close look at
the problems.
5. Problem Statement-
OAuth only takes care about the authorization as its
mechanism works with granting and providingtokensto the
thirdparty applications on the basis of the permissions
granted, however let’s take a scenario wheretheuserlog’s in
with its real account the OAuth verifies by sending the alert
the token is generated. And as per the working when the
token is sent back it carries the details which are vulnerable
to attacks. If the user by using a proxy server or a better
Vpns gets this sent back token from the OAuth, Now the
attacker can easily change the username in the token as
OAuth only sends and uses username,thusiftheusernameis
changed in the url than the user will login successfully by
another username and thus this creates a problem that the
OAuth does not provide the user with any security once the
token are granted. Thus, the entered username is of another
user and thus the attacker can easily login withits name.and
the real user of that name is unaware that his Id is being
used by someone.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31319 | Volume – 4 | Issue – 4 | May-June 2020 Page 999
6. Conclusion-
Leaf certificate. By sticking against your leaf testament, you
are ensuring with near 100% sureness this is your
declaration and along these lines the chain is substantial.
Leaf endorsements will in general have a short expiry time
and if, for example. On the off chance that the solicitation
flops because of a missing, invalid, or jumbling redirection
URI, or if the customer identifier is absent or invalid the
approval server SHOULD educate the asset proprietor
regarding the error and MUST NOT consequently divert the
client specialist to the invalid redirection URI. Tokens ought
not to make some long memories expiry date. For android
gadgets the information ought not to be put away on
neighbourhood stockpiling. Transient expiry tokens are
helpful.
7. Future Enhancements-
OAuth can use security alerts to the user after the tokensare
generated. Thus, this will create an alert for the user that his
account has been used, which will result eitherremoving the
data of game from the google account which is not being
linked by the user.
8. Reference-
[1] Security Flows in OAuth 2.0 Framework: A Case Study:
{https://www.researchgate.net/publication/3194535
79}
[2] OAuth 2.0 Hack Exposes 1 Billion Mobile Apps to
Account Hijacking: (https://threatpost.com/OAuth-2-
0-hackexposes-1-billion-mobile-apps-to-
accounthijacking/121889/).
[3] Top 10 OAuth 2 Implementation Vulnerabilities:
(http://blog.intothesymmetry.com/2015/12/top-10-
OAuth-2-implementation.html).
[4] OAuth authentication fails in a proxyscenariobetween
Exchange Server 2013 hybrid on-premises and Office
365:
(https://support.microsoft.com/enin/help/3137585/
OAuth-authenticationfails-in-a-proxy-scenario-
betweenexchange-server).
[5] Four Attacks on OAuth - How to Secure Your OAuth
Implementation:
https://www.sans.org/readingroom/whitepapers/app
lication/attacks-OAuth-secure-OAuth-implementation-
33644).

More Related Content

PDF
Remote Exploitation of the Dropbox SDK for Android
PDF
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
PDF
SpoofedMe - Intruding Accounts using Social Login Providers
PDF
Overtaking Firefox Profiles: Vulnerabilities in Firefox for Android
PDF
Web phish detection (an evolutionary approach)
PDF
Web phish detection (an evolutionary approach)
PDF
A security note for web developers
PDF
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
Remote Exploitation of the Dropbox SDK for Android
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
SpoofedMe - Intruding Accounts using Social Login Providers
Overtaking Firefox Profiles: Vulnerabilities in Firefox for Android
Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)
A security note for web developers
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...

What's hot (18)

PDF
I1804015458
KEY
OAuth Android Göteborg
PDF
1208 wp-two-factor-and-swivel-whitepaper
PPTX
Presentation On CLoudSweeper By Harini Anand
PDF
IRJET - Secure Banking Application with Image and GPS Location
PPTX
SQL injection
PDF
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
PDF
Top 10 android_development_vulnerailities
PDF
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
PDF
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
PPTX
Development of Twitter Application #5 - Users
PDF
GHC18 Abstract - API Security, a Grail Quest
PDF
Review on OpenID Authentication Framework
PDF
50120130405019
PPTX
Single Sign-On security issue in Cloud Computing
PDF
Security & Compliance for Startups
PDF
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
PDF
Image authentication for secure login
I1804015458
OAuth Android Göteborg
1208 wp-two-factor-and-swivel-whitepaper
Presentation On CLoudSweeper By Harini Anand
IRJET - Secure Banking Application with Image and GPS Location
SQL injection
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
Top 10 android_development_vulnerailities
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
Development of Twitter Application #5 - Users
GHC18 Abstract - API Security, a Grail Quest
Review on OpenID Authentication Framework
50120130405019
Single Sign-On security issue in Cloud Computing
Security & Compliance for Startups
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
Image authentication for secure login
Ad

Similar to Flaws in Oauth 2.0 Can Oauth be used as a Security Server (20)

PDF
SAML VS OAuth 2.0 VS OpenID Connect
PPTX
PDF
attacks-oauth-secure-oauth-implementation-33644.pdf
PDF
OAuth 2.0 and OpenID Connect
PPTX
Oauth2 and OWSM OAuth2 support
PPTX
OAuth with Salesforce - Demystified
PDF
Stateless Auth using OAuth2 & JWT
PDF
Stateless Auth using OAUTH2 & JWT
PPTX
Single-Page-Application & REST security
PPTX
O auth2 with angular js
PPTX
OAuth 2 Spring Boot 3 Integration Presentation
PDF
A technical insight into the concepts and terminologies behind oauth – an ope...
PDF
Demystifying OAuth 2.0
PPTX
OAuth 2.0 - The fundamentals, the good , the bad, technical primer and commo...
PPTX
Rest API Security - A quick understanding of Rest API Security
PPTX
Intro to OAuth2 and OpenID Connect
PPTX
OAuth2 Introduction
PPTX
Microservice security with spring security 5.1,Oauth 2.0 and open id connect
PDF
Oauth2.0 tutorial
PPT
Oauth2.0
SAML VS OAuth 2.0 VS OpenID Connect
attacks-oauth-secure-oauth-implementation-33644.pdf
OAuth 2.0 and OpenID Connect
Oauth2 and OWSM OAuth2 support
OAuth with Salesforce - Demystified
Stateless Auth using OAuth2 & JWT
Stateless Auth using OAUTH2 & JWT
Single-Page-Application & REST security
O auth2 with angular js
OAuth 2 Spring Boot 3 Integration Presentation
A technical insight into the concepts and terminologies behind oauth – an ope...
Demystifying OAuth 2.0
OAuth 2.0 - The fundamentals, the good , the bad, technical primer and commo...
Rest API Security - A quick understanding of Rest API Security
Intro to OAuth2 and OpenID Connect
OAuth2 Introduction
Microservice security with spring security 5.1,Oauth 2.0 and open id connect
Oauth2.0 tutorial
Oauth2.0
Ad

More from ijtsrd (20)

PDF
A Study of School Dropout in Rural Districts of Darjeeling and Its Causes
PDF
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
PDF
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
PDF
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
PDF
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
PDF
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
PDF
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
PDF
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
PDF
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
PDF
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
PDF
Automatic Accident Detection and Emergency Alert System using IoT
PDF
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
PDF
The Role of Media in Tribal Health and Educational Progress of Odisha
PDF
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
PDF
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
PDF
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
PDF
Performance of Grid Connected Solar PV Power Plant at Clear Sky Day
PDF
Vitiligo Treated Homoeopathically A Case Report
PDF
Vitiligo Treated Homoeopathically A Case Report
PDF
Uterine Fibroids Homoeopathic Perspectives
A Study of School Dropout in Rural Districts of Darjeeling and Its Causes
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
Automatic Accident Detection and Emergency Alert System using IoT
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
The Role of Media in Tribal Health and Educational Progress of Odisha
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
Performance of Grid Connected Solar PV Power Plant at Clear Sky Day
Vitiligo Treated Homoeopathically A Case Report
Vitiligo Treated Homoeopathically A Case Report
Uterine Fibroids Homoeopathic Perspectives

Recently uploaded (20)

PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Insiders guide to clinical Medicine.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
master seminar digital applications in india
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
RMMM.pdf make it easy to upload and study
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Lesson notes of climatology university.
PDF
Sports Quiz easy sports quiz sports quiz
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Computing-Curriculum for Schools in Ghana
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
O7-L3 Supply Chain Operations - ICLT Program
VCE English Exam - Section C Student Revision Booklet
Insiders guide to clinical Medicine.pdf
Supply Chain Operations Speaking Notes -ICLT Program
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
master seminar digital applications in india
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
RMMM.pdf make it easy to upload and study
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Abdominal Access Techniques with Prof. Dr. R K Mishra
Lesson notes of climatology university.
Sports Quiz easy sports quiz sports quiz
TR - Agricultural Crops Production NC III.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Computing-Curriculum for Schools in Ghana
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
2.FourierTransform-ShortQuestionswithAnswers.pdf

Flaws in Oauth 2.0 Can Oauth be used as a Security Server

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 4 Issue 4, June 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD31319 | Volume – 4 | Issue – 4 | May-June 2020 Page 997 Flaws in Oauth 2.0: Can Oauth be used as a Security Server Pooja Krushna Paste, Pratik Ramakant Vaidya Department of MCA, ASM Institute of Management & Computer Studies, Thane, Maharashtra, India ABSTRACT OAuth 2.0 is the business standard convention for approval. OAuth 2.0 spotlights on customer engineer straightforwardness while giving explicit approval streams to web applications,work area applications,cell phones,and lounge room gadgets. The scientists analyzed 600 top U.S. also, ChAndroid versatile applications that utilization OAuth 2.0 APIs from Facebook, Google and Sina—which works Weibo in China—and backing SSO for outsider applications. The scientists found that 41.2 percent of the applications they tried were defenseless against their attackinese. KEYWORDS: OAuth, Proxy Servers, Vpns, Authorization tokens How to cite this paper: Pooja Krushna Paste | Pratik Ramakant Vaidya "Flaws in Oauth 2.0: Can Oauth be used asa Security Server" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-4 | Issue-4, June 2020, pp.997-999, URL: www.ijtsrd.com/papers/ijtsrd31319.pdf Copyright © 2020 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) 1. INTRODUCTION The OAuth 2.0 convention is one of the most broadly sent approval/single sign-on (SSO) conventionsandfurthermore fills in as the establishment for the new SSO standard OpenID Connect. Notwithstanding the notorietyofOAuth, so far examination endeavors were generally focused at discovering bugs in explicit executions and depended on formal models which conceptual from many webs includes or didn't give a proper treatment by any stretch of the imagination. In this paper, we do the primary broad conventional examination of the OAuth 2.0 standard in an expressive web model. Our investigation targets setting up solid approval, verification, and meeting uprightness ensures, for which we give formal definitions. In our proper investigation, each of the four OAuth Grant Types (approval code award, certain award, asset Owner Password Credentials Grant, and the customer Credentials Grant) are secured. They may even run all the while in the equivalent and distinctive depending gatherings and Identity Provider (IDP), where noxious depending parties, personality suppliers, and programs are considered also. Our demonstrating and examination of the OAuth 2.0 standard expect that security proposals and Best Practices are followed, so as to stay away from clear and known assaults. 2. OAuth Review- The OAuth and Google Sign-In connecting type includes Google Sign-In top of OAuth based record connecting. This gives consistent voicebased connecting to Google clients while likewise empowering account connecting for clients who enrolled to your administration with a non-Google personality. This connecting type starts with Google Sign-In, which permits you to check if the client's Google profile data exists in your framework. In the event that the client's data isn't found in your framework, a standard OAuth stream starts. The client can likewise decide to make another record with their Google profile data I. OAuth Used by Facebook- 267 million Facebook users' data has supposedly been leaked. Comparitech and security analyst Bob Diachenko have revealed a database containing in excess of 267 million Facebook users' data that was left uncovered on the web, with not so much as a secret key forestalling unapproved access to it. On the off chance that you've at any point utilized a "Sign in With Facebook" catch, orgivenanoutsider application access to your Twitter account, you've utilized OAuth. It's additionally utilized by Google, Microsoft, and LinkedIn, just as numerous other recordsuppliers.Basically, OAuth permits you to concede a site access to some data about your record without giving it your genuine record secret key. IJTSRD31319
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31319 | Volume – 4 | Issue – 4 | May-June 2020 Page 998 II. OAuth used by Google- Google APIs utilize the OAuth 2.0 convention for confirmation and approval. Google bolsters regular OAuth 2.0 situations, for example, those for web server, customer side, introduced, and constrained information gadget applications. To start, acquire OAuth 2.0 customer accreditations from the Google API Console. At that point your customer application demands an entrance tokenfrom the Google Authorization Server, extricates a token from the reaction, and sends the token to the Google API that you need to get to. For an intelligent exhibitofutilizingOAuth 2.0 with Google (counting the alternative to utilize your own customer qualifications), try different things withtheOAuth 2.0 Playground. III. Games that use OAuth- This record clarifies how applicationsintroducedongadgets like telephones, tablets, and PCs utilize Google's OAuth 2.0 endpoints to approve access to Google APIs. OAuth 2.0 permits clients to impart explicit information to an application while keeping their usernames, passwords, and other data private. For instance, an application can utilize OAuth 2.0 to get consent from clients to store records in their Google Drives. Introduced applications are disseminated to singular gadgets, and it is accepted that these applications can't keep insider facts. They can get to Google APIs while the client is available at the application or when the application is running out of sight. This approval stream is like the one utilized for web server applications. The fundamental contrast is that introduced applications must open the framework program and gracefully a neighborhood divert URI to deal with reactions from Google's approval server. Linking games with your google play store account has always been secure but what if we starttolink anothersocial media app with the application currently using than it may result in data lose or even by using proxy server s can be used to present a user a fake identity. Or an attacker can use another username and can log into the game as another user. IV. Less Risks with short time tokens-Divert URLs are a basic piece of the OAuth stream. After a client effectively approves an application, the approval server will redirect the client back to the application with either an approval code or access token in the URL. Because of approval sidestep in redirect Uri parameter in OAUTH stream; it’s conceivable to divert confirmed clients to subjective spaces with their OAuth accreditations from which it’s conceivable to take over their record. On the off chance that an approval code is utilized more than once, the approval server MUST deny the solicitation. OAuth Providers (servers) that carefully follow rfc6749 are defenseless against open divert. Approval repudiated doesn't send an alarm. V. What Goes in a token Granted- request scope: contacts. response type: code (implicit or others). callback URL. client Id 3. Literature review Redirect URLs are a fundamental bit of the OAuth stream. After a customer viably supports an application, the endorsement server will redirect the customer back to the application with either an endorsementcodeoraccesstoken in the URL. As a result of endorsement avoid in redirect Uri parameter in OAUTH stream, it’s possibletooccupyaffirmed customers to emotional spaces with their OAuth accreditations from which it’s possible to take over their record. In case an endorsement code is usedmorethanonce, the endorsement server MUST deny the requesting. OAuth Providers (servers) that cautiously follow rfc6749 are vulnerable against open occupy. Endorsement renounced doesn't send an alert. 4. Research Methodology- OAuth is being used widely for authorization but it is said that It is not so far god for authentication. And thus, now they use a (sso) that is a single sign on. The sso resides as a thin layer above the OAuth. But now let’s take a close look at the problems. 5. Problem Statement- OAuth only takes care about the authorization as its mechanism works with granting and providingtokensto the thirdparty applications on the basis of the permissions granted, however let’s take a scenario wheretheuserlog’s in with its real account the OAuth verifies by sending the alert the token is generated. And as per the working when the token is sent back it carries the details which are vulnerable to attacks. If the user by using a proxy server or a better Vpns gets this sent back token from the OAuth, Now the attacker can easily change the username in the token as OAuth only sends and uses username,thusiftheusernameis changed in the url than the user will login successfully by another username and thus this creates a problem that the OAuth does not provide the user with any security once the token are granted. Thus, the entered username is of another user and thus the attacker can easily login withits name.and the real user of that name is unaware that his Id is being used by someone.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31319 | Volume – 4 | Issue – 4 | May-June 2020 Page 999 6. Conclusion- Leaf certificate. By sticking against your leaf testament, you are ensuring with near 100% sureness this is your declaration and along these lines the chain is substantial. Leaf endorsements will in general have a short expiry time and if, for example. On the off chance that the solicitation flops because of a missing, invalid, or jumbling redirection URI, or if the customer identifier is absent or invalid the approval server SHOULD educate the asset proprietor regarding the error and MUST NOT consequently divert the client specialist to the invalid redirection URI. Tokens ought not to make some long memories expiry date. For android gadgets the information ought not to be put away on neighbourhood stockpiling. Transient expiry tokens are helpful. 7. Future Enhancements- OAuth can use security alerts to the user after the tokensare generated. Thus, this will create an alert for the user that his account has been used, which will result eitherremoving the data of game from the google account which is not being linked by the user. 8. Reference- [1] Security Flows in OAuth 2.0 Framework: A Case Study: {https://www.researchgate.net/publication/3194535 79} [2] OAuth 2.0 Hack Exposes 1 Billion Mobile Apps to Account Hijacking: (https://threatpost.com/OAuth-2- 0-hackexposes-1-billion-mobile-apps-to- accounthijacking/121889/). [3] Top 10 OAuth 2 Implementation Vulnerabilities: (http://blog.intothesymmetry.com/2015/12/top-10- OAuth-2-implementation.html). [4] OAuth authentication fails in a proxyscenariobetween Exchange Server 2013 hybrid on-premises and Office 365: (https://support.microsoft.com/enin/help/3137585/ OAuth-authenticationfails-in-a-proxy-scenario- betweenexchange-server). [5] Four Attacks on OAuth - How to Secure Your OAuth Implementation: https://www.sans.org/readingroom/whitepapers/app lication/attacks-OAuth-secure-OAuth-implementation- 33644).