Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTRmanYtcG1oZy0zcmZn

Multiple cryptographic issues in Python oic

Impact

Issues

  1. The IdToken signature algorithm was not checked automatically, but only if the expected algorithm was passed in as a kwarg.
  2. JWA none algorithm was allowed in all flows.
  3. oic.consumer.Consumer.parse_authz returns an unverified IdToken. The verification of the token was left to the discretion of the implementator.
  4. iat claim was not checked for sanity (i.e. it could be in the future)

Patches

  1. IdToken signature is now always checked.
  2. JWA none algorithm is now allowed only if using the response_type code
  3. IdToken verification is now done automatically.
  4. iat claim is now checked for sanity.
Permalink: https://github.com/advisories/GHSA-4fjv-pmhg-3rfg
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTRmanYtcG1oZy0zcmZn
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 4 years ago
Updated: over 1 year ago


CVSS Score: 6.8
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

Identifiers: GHSA-4fjv-pmhg-3rfg, CVE-2020-26244
References: Repository: https://github.com/OpenIDC/pyoidc
Blast Radius: 15.3

Affected Packages

pypi:oic
Dependent packages: 14
Dependent repositories: 176
Downloads: 267,822 last month
Affected Version Ranges: < 1.2.1
Fixed in: 1.2.1
All affected versions: 0.4.0, 0.5.0, 0.6.0, 0.7.0, 0.7.2, 0.7.3, 0.7.4, 0.7.5, 0.7.6, 0.7.7, 0.7.8, 0.8.1, 0.8.2, 0.8.3, 0.12.0, 0.13.0, 0.13.1, 0.14.0, 0.15.0, 0.15.1, 1.0.0, 1.0.1, 1.1.0, 1.1.1, 1.1.2, 1.2.0
All unaffected versions: 1.2.1, 1.3.0, 1.4.0, 1.5.0, 1.6.0, 1.6.1, 1.7.0