Skip to content

Commit 5dd1847

Browse files
committed
replace "sanitize" language
closes #209 also dropped "code" from the title because otherwise it sounds like authorization code injection attack
1 parent a93458a commit 5dd1847

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

draft-ietf-oauth-v2-1.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3039,17 +3039,17 @@ by the authorization server. Even in such cases, additional
30393039
countermeasures SHOULD still be employed.
30403040

30413041

3042-
## Code Injection and Input Validation
3042+
## Injection and Input Validation
30433043

3044-
A code injection attack occurs when an input or otherwise external
3044+
An injection attack occurs when an input or otherwise external
30453045
variable is used by an application unsanitized and causes
30463046
modification to the application logic. This may allow an attacker to
30473047
gain access to the application device or its data, cause denial of
30483048
service, or introduce a wide range of malicious side-effects.
30493049

3050-
The authorization server and client MUST sanitize (and validate when
3051-
possible) any value received -- in particular, the value of the
3052-
`state` and `redirect_uri` parameters.
3050+
The authorization server and client MUST treat parameters received
3051+
as potentially malicious external input and apply appropriate protections,
3052+
in particular, the values of the `state` and `redirect_uri` parameters.
30533053

30543054

30553055
## Open Redirection {#open-redirectors}

0 commit comments

Comments
 (0)