Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTRmanYtcG1oZy0zcmZn
Multiple cryptographic issues in Python oic
Impact
- Client implementations using this library
Issues
- The IdToken signature algorithm was not checked automatically, but only if the expected algorithm was passed in as a kwarg.
- JWA
none
algorithm was allowed in all flows. oic.consumer.Consumer.parse_authz
returns an unverified IdToken. The verification of the token was left to the discretion of the implementator.iat
claim was not checked for sanity (i.e. it could be in the future)
Patches
- IdToken signature is now always checked.
- JWA
none
algorithm is now allowed only if using theresponse_type
code
- IdToken verification is now done automatically.
iat
claim is now checked for sanity.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTRmanYtcG1oZy0zcmZn
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 3 years ago
Updated: 9 months ago
CVSS Score: 6.8
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
Identifiers: GHSA-4fjv-pmhg-3rfg, CVE-2020-26244
References:
- https://github.com/OpenIDC/pyoidc/security/advisories/GHSA-4fjv-pmhg-3rfg
- https://github.com/OpenIDC/pyoidc/commit/62f8d753fa17c8b1f29f8be639cf0b33afb02498
- https://github.com/OpenIDC/pyoidc/releases/tag/1.2.1
- https://pypi.org/project/oic/
- https://nvd.nist.gov/vuln/detail/CVE-2020-26244
- https://github.com/advisories/GHSA-4fjv-pmhg-3rfg
Affected Packages
pypi:oic
Versions: < 1.2.1Fixed in: 1.2.1