CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
EPSS
Percentile
68.0%
uri_validate
functions depending where it is used.What kind of vulnerability is it? Who is impacted?
Oauthlib applications using OAuth2.0 provider support or use directly uri_validate
function.
Has the problem been patched? What versions should users upgrade to?
Issue fixed in 3.2.2 release.
Is there a way for users to fix or remediate the vulnerability without upgrading?
The redirect_uri
can be verified in web toolkit (i.e bottle-oauthlib
, django-oauth-toolkit
, …) before oauthlib is called. A sample check if :
is present to reject the request can prevent the DoS, assuming no port or IPv6 is fundamentally required.
Attack Vector:
uri_validate
functions:is_absolute_uri("http://[:::::::::::::::::::::::::::::::::::::::]/path")
Special thanks to Sebastian Chnelik - PyUp.io
github.com/advisories/GHSA-3pgj-pg6c-r5p7
github.com/oauthlib/oauthlib/blob/2b8a44855a51ad5a5b0c348a08c2564a2e197ea2/oauthlib/uri_validate.py
github.com/oauthlib/oauthlib/blob/d4bafd9f1d0eba3766e933b1ac598cbbf37b8914/oauthlib/oauth2/rfc6749/grant_types/base.py#L232
github.com/oauthlib/oauthlib/commit/2e40b412c844ecc4673c3fa3f72181f228bdbacd
github.com/oauthlib/oauthlib/releases/tag/v3.2.1
github.com/oauthlib/oauthlib/security/advisories/GHSA-3pgj-pg6c-r5p7
github.com/pypa/advisory-database/tree/main/vulns/oauthlib/PYSEC-2022-269.yaml
lists.fedoraproject.org/archives/list/[email protected]/message/LXOPIA6M57CFQPUT6HHSNXCTV6QA3UDI/
lists.fedoraproject.org/archives/list/[email protected]/message/NBCQJR3ZF7FVNTJYRVPVSQEQRAYZIUHU/
lists.fedoraproject.org/archives/list/[email protected]/message/QRYLYHE5HWF6R2CRLJFUK4PILR47WXOE/
lists.fedoraproject.org/archives/list/[email protected]/message/X2CQZM5CKOUM4GW2GTAPQEQFPITQ6F7S/
nvd.nist.gov/vuln/detail/CVE-2022-36087