CVE-2023-50708: yii2-authclient vulnerable to possible timing attack on string comparison in OAuth1, OAuth2 and OpenID Connect implementation
Impact
What kind of vulnerability is it? Who is impacted?
Original Report:
The Oauth1/2 “state” and OpenID Connect “nonce” is vulnerable for a “timing attack” since it’s compared via regular string comparison (instead of
Yii::$app->getSecurity()->compareString()
).
Affected Code:
- OAuth 1 “state”
- OAuth 2 “state”
- OpenID Connect “nonce”
Patches
Has the problem been patched? What versions should users upgrade to?
TBD: Replace strcmp with Yii::$app->getSecurity()->compareString()
).
Workarounds
Is there a way for users to fix or remediate the vulnerability without upgrading?
not as far as I see.
References
Are there any links users can visit to find out more?
References
- github.com/advisories/GHSA-w8vh-p74j-x9xp
- github.com/yiisoft/yii2-authclient/blob/0d1c3880f4d79e20aa1d77c012650b54e69695ff/src/OAuth1.php
- github.com/yiisoft/yii2-authclient/blob/0d1c3880f4d79e20aa1d77c012650b54e69695ff/src/OAuth2.php
- github.com/yiisoft/yii2-authclient/blob/0d1c3880f4d79e20aa1d77c012650b54e69695ff/src/OpenIdConnect.php
- github.com/yiisoft/yii2-authclient/commit/dabddf2154ab7e7703740205a069202554089248
- github.com/yiisoft/yii2-authclient/security/advisories/GHSA-w8vh-p74j-x9xp
Detect and mitigate CVE-2023-50708 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →