Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-36087
HistorySep 09, 2022 - 12:00 a.m.

CVE-2022-36087 OAuthLib vulnerable DoS when attacker provides malicious IPV6 URI

2022-09-0900:00:00
CWE-20
GitHub_M
www.cve.org
5
oauthlib
vulnerability
cve-2022-36087
dos
malicious ipv6 uri
denial of service
python
oauth2.0
provider support
uri_validate
patch

CVSS3

5.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H

EPSS

0.003

Percentile

68.0%

OAuthLib is an implementation of the OAuth request-signing logic for Python 3.6+. In OAuthLib versions 3.1.1 until 3.2.1, an attacker providing malicious redirect uri can cause denial of service. An attacker can also leverage usage of uri_validate functions depending where it is used. OAuthLib applications using OAuth2.0 provider support or use directly uri_validate are affected by this issue. Version 3.2.1 contains a patch. There are no known workarounds.

CNA Affected

[
  {
    "vendor": "oauthlib",
    "product": "oauthlib",
    "versions": [
      {
        "version": ">= 3.1.1, < 3.2.1",
        "status": "affected"
      }
    ]
  }
]

References

CVSS3

5.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H

EPSS

0.003

Percentile

68.0%