Skip to content

Commit 69dcdec

Browse files
authored
Merge pull request #113 from marcopernpruner/patch-2
Fix editorial issues
2 parents 5ca7160 + 3c89b2e commit 69dcdec

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

draft-ietf-oauth-cross-device-security.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -492,7 +492,7 @@ Attackers exploit cross-device session transfer flows by using social engineerin
492492
| | | |
493493
| | | |
494494
+--------------+ | |
495-
(A)Attacker scans | | |
495+
(F)Attacker scans | | |
496496
QR code or enters| | |
497497
Session Transfer | | |
498498
Code v (G) Present Session | |
@@ -514,7 +514,7 @@ Figure: Cross-Device Flows: Session Transfer Pattern Exploit
514514
- (F) Once the attacker receives the QR code, they scan it or enter it on their own Consumption Device.
515515
- (G) The client on the Consumption Device presents the session transfer code to the Authorization Server.
516516
- (H) The Authorization Server verifies the session transfer code and retrieves the session context information needed to resume the session on the Consumption Device.
517-
- (I) The attacker resumes the session on their own Consumption device and is able to access the information that the user authorized on their Authorization Device in step (B).
517+
- (I) The attacker resumes the session on their own Consumption Device and is able to access the information that the user authorized on their Authorization Device in step (B).
518518

519519
## Examples of Cross-Device Flow Exploits
520520
The following examples illustrate these attacks in practical settings and show how the unauthenticated channel is exploited by attackers who can copy the QR codes and user codes, change the context in which they are presented using social engineering techniques and mislead end-users into granting consent to avail of services, access data and make payments.

0 commit comments

Comments
 (0)