Hi Daniele,

On Wed, Sep 14, 2022 at 10:37:08AM +0200, Daniele Tricoli wrote:
> Hello Salvatore,
> many thanks for the report!
> 
> On 13/09/2022 22:14, Salvatore Bonaccorso wrote:
> > Source: python-oauthlib
> > Version: 3.2.0-1
> > Severity: important
> > Tags: security upstream
> > X-Debbugs-Cc: car...@debian.org, Debian Security Team 
> > <t...@security.debian.org>
> > 
> > Hi,
> > 
> > The following vulnerability was published for python-oauthlib.
> > 
> > CVE-2022-36087[0]:
> > | OAuthLib is an implementation of the OAuth request-signing logic for
> > | Python 3.6+. In OAuthLib versions 3.1.1 until 3.2.1, an attacker
> > | providing malicious redirect uri can cause denial of service. An
> > | attacker can also leverage usage of `uri_validate` functions depending
> > | where it is used. OAuthLib applications using OAuth2.0 provider
> > | support or use directly `uri_validate` are affected by this issue.
> > | Version 3.2.1 contains a patch. There are no known workarounds.
> > 
> > Note, that while it is claimed to be fixed in 3.2.1, the two commits
> > in [1] and [2] are not included in 3.2.1. There is a simple test case
> > to show the issue as well in the commit expanding the unittests.
> 
> I'm preparing a new upload for python-oauthlib and I will include also the
> two commits you mentioned. Thanks!

Thanks to you  for the quick action!

Regards,
Salvatore

Reply via email to