Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4fjv-pmhg-3rfg

Опубликовано: 04 дек. 2020
Источник: github
Github: Прошло ревью
CVSS4: 7.6
CVSS3: 6.8

Описание

Multiple cryptographic issues in Python oic

Impact

  • Client implementations using this library

Issues

  1. The IdToken signature algorithm was not checked automatically, but only if the expected algorithm was passed in as a kwarg.
  2. JWA none algorithm was allowed in all flows.
  3. oic.consumer.Consumer.parse_authz returns an unverified IdToken. The verification of the token was left to the discretion of the implementator.
  4. iat claim was not checked for sanity (i.e. it could be in the future)

Patches

  1. IdToken signature is now always checked.
  2. JWA none algorithm is now allowed only if using the response_type code
  3. IdToken verification is now done automatically.
  4. iat claim is now checked for sanity.

Пакеты

Наименование

oic

pip
Затронутые версииВерсия исправления

< 1.2.1

1.2.1

EPSS

Процентиль: 37%
0.00155
Низкий

7.6 High

CVSS4

6.8 Medium

CVSS3

Дефекты

CWE-325
CWE-347

Связанные уязвимости

CVSS3: 6.8
nvd
около 5 лет назад

Python oic is a Python OpenID Connect implementation. In Python oic before version 1.2.1, there are several related cryptographic issues affecting client implementations that use the library. The issues are: 1) The IdToken signature algorithm was not checked automatically, but only if the expected algorithm was passed in as a kwarg. 2) JWA `none` algorithm was allowed in all flows. 3) oic.consumer.Consumer.parse_authz returns an unverified IdToken. The verification of the token was left to the discretion of the implementator. 4) iat claim was not checked for sanity (i.e. it could be in the future). These issues are patched in version 1.2.1.

EPSS

Процентиль: 37%
0.00155
Низкий

7.6 High

CVSS4

6.8 Medium

CVSS3

Дефекты

CWE-325
CWE-347