Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3pgj-pg6c-r5p7

Опубликовано: 16 сент. 2022
Источник: github
Github: Прошло ревью
CVSS4: 6.9
CVSS3: 5.7

Описание

OAuthLib vulnerable to DoS when attacker provides malicious IPV6 URI

Impact

  • Attacker providing malicious redirect uri can cause DoS to oauthlib's web application.
  • Attacker can also leverage usage of uri_validate functions depending where it is used.

What kind of vulnerability is it? Who is impacted?

Oauthlib applications using OAuth2.0 provider support or use directly uri_validate function.

Patches

Has the problem been patched? What versions should users upgrade to?

Issue fixed in 3.2.2 release.

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading?

The redirect_uri can be verified in web toolkit (i.e bottle-oauthlib, django-oauth-toolkit, ...) before oauthlib is called. A sample check if : is present to reject the request can prevent the DoS, assuming no port or IPv6 is fundamentally required.

References

Attack Vector:

PoC

is_absolute_uri("http://[:::::::::::::::::::::::::::::::::::::::]/path")

Acknowledgement

Special thanks to Sebastian Chnelik - PyUp.io

Пакеты

Наименование

oauthlib

pip
Затронутые версииВерсия исправления

>= 3.1.1, < 3.2.2

3.2.2

EPSS

Процентиль: 56%
0.00337
Низкий

6.9 Medium

CVSS4

5.7 Medium

CVSS3

Дефекты

CWE-20
CWE-601

Связанные уязвимости

CVSS3: 5.7
ubuntu
почти 3 года назад

OAuthLib is an implementation of the OAuth request-signing logic for Python 3.6+. In OAuthLib versions 3.1.1 until 3.2.1, an attacker providing malicious redirect uri can cause denial of service. An attacker can also leverage usage of `uri_validate` functions depending where it is used. OAuthLib applications using OAuth2.0 provider support or use directly `uri_validate` are affected by this issue. Version 3.2.1 contains a patch. There are no known workarounds.

CVSS3: 6.5
redhat
почти 3 года назад

OAuthLib is an implementation of the OAuth request-signing logic for Python 3.6+. In OAuthLib versions 3.1.1 until 3.2.1, an attacker providing malicious redirect uri can cause denial of service. An attacker can also leverage usage of `uri_validate` functions depending where it is used. OAuthLib applications using OAuth2.0 provider support or use directly `uri_validate` are affected by this issue. Version 3.2.1 contains a patch. There are no known workarounds.

CVSS3: 5.7
nvd
почти 3 года назад

OAuthLib is an implementation of the OAuth request-signing logic for Python 3.6+. In OAuthLib versions 3.1.1 until 3.2.1, an attacker providing malicious redirect uri can cause denial of service. An attacker can also leverage usage of `uri_validate` functions depending where it is used. OAuthLib applications using OAuth2.0 provider support or use directly `uri_validate` are affected by this issue. Version 3.2.1 contains a patch. There are no known workarounds.

CVSS3: 5.7
debian
почти 3 года назад

OAuthLib is an implementation of the OAuth request-signing logic for P ...

CVSS3: 6.5
redos
около 1 месяца назад

Уязвимость python3-oauthlib

EPSS

Процентиль: 56%
0.00337
Низкий

6.9 Medium

CVSS4

5.7 Medium

CVSS3

Дефекты

CWE-20
CWE-601