yii2-authclient vulnerable to possible timing attack on string comparison in OAuth1, OAuth2 and OpenID Connect implementation
Low severity
GitHub Reviewed
Published
Dec 16, 2023
in
yiisoft/yii2-authclient
•
Updated Dec 22, 2023
Description
Published to the GitHub Advisory Database
Dec 18, 2023
Reviewed
Dec 18, 2023
Published by the National Vulnerability Database
Dec 22, 2023
Last updated
Dec 22, 2023
Impact
What kind of vulnerability is it? Who is impacted?
Original Report:
Affected Code:
OAuth 1 "state"
https://github.com/yiisoft/yii2-authclient/blob/0d1c3880f4d79e20aa1d77c012650b54e69695ff/src/OAuth1.php#L158
OAuth 2 "state"
https://github.com/yiisoft/yii2-authclient/blob/0d1c3880f4d79e20aa1d77c012650b54e69695ff/src/OAuth2.php#L121
OpenID Connect "nonce"
https://github.com/yiisoft/yii2-authclient/blob/0d1c3880f4d79e20aa1d77c012650b54e69695ff/src/OpenIdConnect.php#L420
Patches
Has the problem been patched? What versions should users upgrade to?
TBD: Replace strcmp with
Yii::$app->getSecurity()->compareString()
).Workarounds
Is there a way for users to fix or remediate the vulnerability without upgrading?
not as far as I see.
References
Are there any links users can visit to find out more?
References