Source: python-oauthlib
Version: 3.2.0-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for python-oauthlib.

CVE-2022-36087[0]:
| OAuthLib is an implementation of the OAuth request-signing logic for
| Python 3.6+. In OAuthLib versions 3.1.1 until 3.2.1, an attacker
| providing malicious redirect uri can cause denial of service. An
| attacker can also leverage usage of `uri_validate` functions depending
| where it is used. OAuthLib applications using OAuth2.0 provider
| support or use directly `uri_validate` are affected by this issue.
| Version 3.2.1 contains a patch. There are no known workarounds.

Note, that while it is claimed to be fixed in 3.2.1, the two commits
in [1] and [2] are not included in 3.2.1. There is a simple test case
to show the issue as well in the commit expanding the unittests.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-36087
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36087
[1] https://github.com/oauthlib/oauthlib/security/advisories/GHSA-3pgj-pg6c-r5p7
[2] 
https://github.com/oauthlib/oauthlib/commit/e514826eea15f2b62bbc13da407b71552ef5ff4c
[3] 
https://github.com/oauthlib/oauthlib/commit/5d85c61998692643dd9d17e05d2646e06ce391e8

Regards,
Salvatore

Reply via email to