-
Notifications
You must be signed in to change notification settings - Fork 73
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Stripe do not follow RFC6749 OAuth 2 specification in case of rejection by user #948
Comments
Thanks for bringing this to our attention. The eng team is taking a look to ensure we handle this case correctly! |
Thank you for your quick answer. Since it is part of the same area, and I am preparing the data for the review, I saw that your installation links for the app also obviously lack the
The spec does not mention this type of procedure for the same CSRF security issue, and currently our platform rejects requests without the There is the possibility of chatting with the review team to draw attention to this aspect? Otherwise we cannot send the app for review because I think it will be rejected even if it is not up to us. |
We do document that the OAuth install link is recommended to include the Perhaps I'm misunderstanding where you are getting the link and it's lacking that param? |
@gabrielhurley-stripe Sorry, I forgot to include the link to the documentation I was referring to: https://docs.stripe.com/stripe-apps/publish-app#submit-app-for-review Point 5 of the "Submit app for review" section indicates that it is mandatory to specify the Marketplace install URL for OAuth apps. In the URL that I must specify in the form, should I include a value (in this case hardcoded) of the There is news about:
|
Is there any news about it? |
As requested in stripe-php#1653 I report the issue here.
Describe the bug
I don't know if this is the right place to open this issue, but since I use the PHP SDK I thought it appropriate to do it here.
Stripe do not follow RFC 6749 section 4.1.2 in the case of authorization rejected by the user. The
state
parameter is required in the response if theclient_id
andredirect_uri
in the request are both valid (see also section 4.1.2.1), I quote:Consider implementing the specification according the RFC6749, otherwise cross-site request forgery cannot be verified.
To Reproduce
Steps to reproduce the behavior:
https://marketplace.stripe.com/oauth/v2/authorize?client_id=${clientId}&redirect_uri=${redirectUrl}&state=${state}
state
parameter:https://*********/oauth2?error=access_denied&error_description=The+user+denied+your+request
Expected behavior
state
parameter must be returned unchanged.Screenshots
Desktop (please complete the following information):
The text was updated successfully, but these errors were encountered: