GHSA-4fjv-pmhg-3rfg

Suggest an improvement
Source
https://github.com/advisories/GHSA-4fjv-pmhg-3rfg
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/12/GHSA-4fjv-pmhg-3rfg/GHSA-4fjv-pmhg-3rfg.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-4fjv-pmhg-3rfg
Aliases
Published
2020-12-04T16:47:12Z
Modified
2024-10-07T21:24:46.784989Z
Severity
  • 6.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
  • 7.6 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
Multiple cryptographic issues in Python oic
Details

Impact

  • Client implementations using this library

Issues

1) The IdToken signature algorithm was not checked automatically, but only if the expected algorithm was passed in as a kwarg. 2) JWA none algorithm was allowed in all flows. 3) oic.consumer.Consumer.parse_authz returns an unverified IdToken. The verification of the token was left to the discretion of the implementator. 4) iat claim was not checked for sanity (i.e. it could be in the future)

Patches

1) IdToken signature is now always checked. 2) JWA none algorithm is now allowed only if using the response_type code 3) IdToken verification is now done automatically. 4) iat claim is now checked for sanity.

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-325",
        "CWE-347"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2020-12-02T20:06:06Z"
}
References

Affected packages

PyPI / oic

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.1

Affected versions

0.*

0.4.0
0.5.0
0.6.0
0.7.0
0.7.2
0.7.3
0.7.4
0.7.5
0.7.6
0.7.7
0.7.8
0.8.1
0.8.2
0.8.3
0.8.4.0
0.8.5.0
0.9.0.0
0.9.1.0
0.9.4.0
0.9.5.0
0.10.0.0
0.11.0.0
0.11.0.1
0.12.0
0.13.0
0.13.1
0.14.0
0.15.0
0.15.1

1.*

1.0.0
1.0.1
1.1.0
1.1.1
1.1.2
1.2.0