The severity is assessed as CRITICAL due to the real-world exploitation and potential for widespread malware infection. The exploitability is high as it targets a common authentication method, and there are no specific patches available.
An OAuth feature is being exploited to execute phishing attacks, leading to potential malware infections on users' devices. This impacts anyone using OAuth for authentication who falls victim to such phishing campaigns.
Affected Systems
- OAuth implementations across various software
Affected Versions: All versions that have not implemented additional security measures against this phishing vector
Remediation
- Enable two-factor authentication (2FA) for all OAuth clients where possible.
- Implement strict validation of redirect URIs and ensure they match the registered applications.
- Monitor user activity for signs of phishing attempts and educate users on identifying such threats.
Stack Impact
This affects any service using OAuth, including web services, APIs, and authentication providers. No specific version is noted; this is a general security practice recommendation.