Why do capability-based security systems protect against the confused deputy problem?

According to Wikipedia (https://en.wikipedia.org/wiki/Confused_deputy_problem):

In information security, the confused deputy problem is often cited as
an example of why capability-based security is important, as
capab… Continue reading Why do capability-based security systems protect against the confused deputy problem?

Is the OAuth 2 authorization code flow vulnerable to the Confused Deputy Problem?

Confused Deputy Problem (also known as ‘The Devil Wears Prada’) is an OAuth 2 vulnerability arising when the protocol is used for authentication. Essentially, a malicious client obtains a token for a user, and presents this t… Continue reading Is the OAuth 2 authorization code flow vulnerable to the Confused Deputy Problem?

How does setting Origin to null in a redirected CORS request protect against a confused deputy attack?

Excerpt from Here:

If a cross-origin resource redirects to another resource at a new origin, the browser will set the value of the Origin header to null after redirecting. This prevents additional confused deputy attacks,… Continue reading How does setting Origin to null in a redirected CORS request protect against a confused deputy attack?

Is it safe to use OAuth (Resource Owner Password Credentials Grant) for authentication?

Specifically, do I have to worry about the confused deputy problem if I’m just trying to authorize a user against a single API?

For example: a basic messaging service will want to authenticate and then authorize a user to se… Continue reading Is it safe to use OAuth (Resource Owner Password Credentials Grant) for authentication?