How does the "state" parameter prevent CSRF in OAuth?
The purpose of the state
parameter has been a mystery for me for a long time. I tried to make sense of it from those “preventing CSRF attacks” quotations over and over again, but it just didn’t click (I even talked with ChatGPT for 1 hour about this, just to find it’s making up stories again). Today, encountered this concept again while reading The Copenhagen Book, I finally decided to figure out what this echoed parameter is about.
Prevent CSRF, but how?
Sometime it’s difficult for me to understand some HTTP security concepts with a long history, because imaging a practical scenario for the vulnerability is just difficult. That’s why this post aims at a specific example.
Every answer and explanation about the state
parameter was talking about preventing CSRF attacks, but how does the attack happen in a typical OAuth flow? I mean, the user accesses the login endpoint and gets redirected to the OAuth provider’s page, tweaking some confirmation and then redirected back to the client’s page. Where does the attacker come in?
Let’s use a diagram to illustrate the attack scenario:
Notably, there’s only one legitimate OAuth app (our client) in this scenario, and both the user and the attacker manipulate on this app.
The malicious steps are highlighted in the diagram:
- The attacker enters the OAuth app, and request an OAuth login.
- After the attacker confirms the authorization with his own OAuth provider account, an authorization code is generated and returned to the client.
- ⚠️ Instead of calling the callback endpoint to exchange an access token with the code, the attacker extracts and keeps it.
- ⚠️ The attacker constructs the malicious link with this one-time code and sends it to the victim.
- The victim is misled or prompted to open the link. (A simple request from some image or iframe, for example)
- The victim’s client exchanges an access token with the given authorization code.
- ❌ The victim is authenticated to the app, but with the attacker’s identity!
Now imagine the legitimate app is a payment app, and the attacker can make various transactions on the OAuth provider platform, but you instead pay these bills.
The state
parameter
According to the spec, the state
parameter is an opaque value used by the client to maintain state between the request and callback.
In other words, it’s a client generated encrypted string that is sent to the OAuth provider and echoed back to the client with the authorization code, thus keeping a session between the OAuth request and the callback.
It is the client’s responsibility to check if the state
parameter in the callback matches the one sent in the request. If they don’t match, the client should abort the flow.
Recap
I think the point of understanding how state
prevent CSRF is that the attack is achieved by authenticating user with the attacker’s identity, pretty the opposite of the traditional CSRF attack.
Further Reading
- RFC 6749 - The OAuth 2.0 Authorization Framework
- OAuth - The Copenhagen Book
- The importance of the “state” parameter in OAuth | by Sebastian Łaskawiec | Keycloak | Medium