Safety vulnerability ID: 35463
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Oauth2 1.9 includes a fix for CVE-2013-4347: It was found that python-oauth2 did not properly generate random values for use in nonces. An attacker able to capture network traffic of a website using OAuth2 authentication could use this flaw to conduct replay attacks against that website.
https://github.com/joestump/python-oauth2/commit/82dd2cdd4954cd7b8983d5d64c0dfd9072bf4650
Latest version: 1.9.0.post1
library for OAuth version 1.9
The (1) make_nonce, (2) generate_nonce, and (3) generate_verifier functions in SimpleGeo python-oauth2 uses weak random numbers to generate nonces, which makes it easier for remote attackers to guess the nonce via a brute force attack.
MLIST:[oss-security] 20130912 Re: cve requests for python-oauth2: http://www.openwall.com/lists/oss-security/2013/09/12/7
MISC:https://github.com/simplegeo/python-oauth2/issues/9: https://github.com/simplegeo/python-oauth2/issues/9
MISC:https://github.com/simplegeo/python-oauth2/pull/146: https://github.com/simplegeo/python-oauth2/pull/146
BID:62388: http://www.securityfocus.com/bid/62388
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application