PyPi: Oauth2

CVE-2013-4347

Safety vulnerability ID: 35463

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at May 20, 2014 Updated at Mar 29, 2024
Scan your Python projects for vulnerabilities →

Advisory

Oauth2 1.9 includes a fix for CVE-2013-4347: It was found that python-oauth2 did not properly generate random values for use in nonces. An attacker able to capture network traffic of a website using OAuth2 authentication could use this flaw to conduct replay attacks against that website.
https://github.com/joestump/python-oauth2/commit/82dd2cdd4954cd7b8983d5d64c0dfd9072bf4650

Affected package

oauth2

Latest version: 1.9.0.post1

library for OAuth version 1.9

Affected versions

Fixed versions

Vulnerability changelog

The (1) make_nonce, (2) generate_nonce, and (3) generate_verifier functions in SimpleGeo python-oauth2 uses weak random numbers to generate nonces, which makes it easier for remote attackers to guess the nonce via a brute force attack.


MLIST:[oss-security] 20130912 Re: cve requests for python-oauth2: http://www.openwall.com/lists/oss-security/2013/09/12/7
MISC:https://github.com/simplegeo/python-oauth2/issues/9: https://github.com/simplegeo/python-oauth2/issues/9
MISC:https://github.com/simplegeo/python-oauth2/pull/146: https://github.com/simplegeo/python-oauth2/pull/146
BID:62388: http://www.securityfocus.com/bid/62388

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

MEDIUM 5.8

CVSS v2 Details

MEDIUM 5.8
Access Vector (AV)
NETWORK
Access Complexity (AC)
MEDIUM
Authentication (Au)
NONE
Confidentiality Impact (C)
PARTIAL
Integrity Impact (I)
PARTIAL
Availability Impact (A)
NONE