Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update dependency oauthlib to v3.2.2 [SECURITY] #20

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

renovate[bot]
Copy link

@renovate renovate bot commented Sep 25, 2022

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
oauthlib ==3.1.1 -> ==3.2.2 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2022-36087

Impact

  • Attacker providing malicious redirect uri can cause DoS to oauthlib's web application.
  • Attacker can also leverage usage of uri_validate functions depending where it is used.

What kind of vulnerability is it? Who is impacted?

Oauthlib applications using OAuth2.0 provider support or use directly uri_validate function.

Patches

Has the problem been patched? What versions should users upgrade to?

Issue fixed in 3.2.2 release.

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading?

The redirect_uri can be verified in web toolkit (i.e bottle-oauthlib, django-oauth-toolkit, ...) before oauthlib is called. A sample check if : is present to reject the request can prevent the DoS, assuming no port or IPv6 is fundamentally required.

References

Attack Vector:

PoC

is_absolute_uri("http://[:::::::::::::::::::::::::::::::::::::::]/path")

Acknowledgement

Special thanks to Sebastian Chnelik - PyUp.io


Release Notes

oauthlib/oauthlib (oauthlib)

v3.2.2

Compare Source

OAuth2.0 Provider:

v3.2.1

Compare Source

OAuth2.0 Provider:

  • #​803: Metadata endpoint support of non-HTTPS

OAuth1.0:

  • #​818: Allow IPv6 being parsed by signature

General:

  • Improved and fixed documentation warnings.
  • Cosmetic changes based on isort

v3.2.0

Compare Source

OAuth2.0 Client:

  • #​795: Add Device Authorization Flow for Web Application
  • #​786: Add PKCE support for Client
  • #​783: Fallback to none in case of wrong expires_at format.

OAuth2.0 Provider:

  • #​790: Add support for CORS to metadata endpoint.
  • #​791: Add support for CORS to token endpoint.
  • #​787: Remove comma after Bearer in WWW-Authenticate

OAuth2.0 Provider - OIDC:

  • #​755: Call save_token in Hybrid code flow
  • #​751: OIDC add support of refreshing ID Tokens with refresh_id_token
  • #​751: The RefreshTokenGrant modifiers now take the same arguments as the
    AuthorizationCodeGrant modifiers (token, token_handler, request).

General:

  • Added Python 3.9, 3.10, 3.11
  • Improve Travis & Coverage

Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot force-pushed the renovate/pypi-oauthlib-vulnerability branch from 2165252 to a43c60a Compare March 18, 2023 14:05
@renovate renovate bot changed the title Update dependency oauthlib to v3.2.1 [SECURITY] Update dependency oauthlib to v3.2.2 [SECURITY] Mar 18, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants