You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
could result in server-side request forgery (SSRF) attacks. Applications <spanclass="bcp14">SHOULD</span> protect against such
1826
1826
attacks, e.g., by matching the URL to an allowlist of permitted locations
1827
1827
and ensuring no cookies are sent in the GET request.<ahref="#section-3.10-2" class="pilcrow">¶</a></p>
1828
-
<pid="section-3.10-3">Likewise, the authorization server <spanclass="bcp14">SHOULD</span> check what a hostname resolves to
1828
+
<pid="section-3.10-3">When such an allowlist is not available, the authorization server <spanclass="bcp14">SHOULD</span> check what a hostname resolves to
1829
1829
and avoid making a request if it resolves to a loopback or local IP address.
1830
1830
An example of this is when "attacker.example.com/etc/passwd" is used
1831
1831
as the "jwks_uri" value and there is a DNS entry for "attacker.example.com"
0 commit comments