CVE-2013-4347: SimpleGeo python-oauth2 vulnerable to the use of Insufficiently Random Values to generate nonces
(updated )
The (1) make_nonce, (2) generate_nonce, and (3) generate_verifier functions in SimpleGeo python-oauth2 uses weak random numbers to generate nonces, which makes it easier for remote attackers to guess the nonce via a brute force attack.
References
- access.redhat.com/errata/RHSA-2015:1591
- access.redhat.com/errata/RHSA-2015:1592
- access.redhat.com/security/cve/CVE-2013-4347
- bugzilla.redhat.com/show_bug.cgi?id=1007758
- github.com/advisories/GHSA-rv8h-p43r-4x5r
- github.com/joestump/python-oauth2
- github.com/joestump/python-oauth2/commit/82dd2cdd4954cd7b8983d5d64c0dfd9072bf4650
- github.com/pypa/advisory-database/tree/main/vulns/oauth2/PYSEC-2014-86.yaml
- github.com/simplegeo/python-oauth2/issues/9
- github.com/simplegeo/python-oauth2/pull/146
- nvd.nist.gov/vuln/detail/CVE-2013-4347
Detect and mitigate CVE-2013-4347 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →