Описание
SimpleGeo python-oauth2 vulnerable to the use of Insufficiently Random Values to generate nonces
The (1) make_nonce, (2) generate_nonce, and (3) generate_verifier functions in SimpleGeo python-oauth2 uses weak random numbers to generate nonces, which makes it easier for remote attackers to guess the nonce via a brute force attack.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2013-4347
- https://github.com/simplegeo/python-oauth2/issues/9
- https://github.com/simplegeo/python-oauth2/pull/146
- https://github.com/joestump/python-oauth2/commit/82dd2cdd4954cd7b8983d5d64c0dfd9072bf4650
- https://access.redhat.com/errata/RHSA-2015:1591
- https://access.redhat.com/errata/RHSA-2015:1592
- https://access.redhat.com/security/cve/CVE-2013-4347
- https://bugzilla.redhat.com/show_bug.cgi?id=1007758
- https://github.com/pypa/advisory-database/tree/main/vulns/oauth2/PYSEC-2014-86.yaml
- http://www.openwall.com/lists/oss-security/2013/09/12/7
- http://www.securityfocus.com/bid/62388
Пакеты
oauth2
< 1.9rc1
1.9rc1
Связанные уязвимости
The (1) make_nonce, (2) generate_nonce, and (3) generate_verifier functions in SimpleGeo python-oauth2 uses weak random numbers to generate nonces, which makes it easier for remote attackers to guess the nonce via a brute force attack.
The (1) make_nonce, (2) generate_nonce, and (3) generate_verifier functions in SimpleGeo python-oauth2 uses weak random numbers to generate nonces, which makes it easier for remote attackers to guess the nonce via a brute force attack.
The (1) make_nonce, (2) generate_nonce, and (3) generate_verifier functions in SimpleGeo python-oauth2 uses weak random numbers to generate nonces, which makes it easier for remote attackers to guess the nonce via a brute force attack.
The (1) make_nonce, (2) generate_nonce, and (3) generate_verifier func ...