CVE-2020-26244 – oic
Package
Manager: pip
Name: oic
Vulnerable Version: >=0 <1.2.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00155 pctl0.36818
Details
Multiple cryptographic issues in Python oic ### Impact * Client implementations using this library ### Issues 1) The IdToken signature algorithm was not checked automatically, but only if the expected algorithm was passed in as a kwarg. 2) JWA `none` algorithm was allowed in all flows. 3) `oic.consumer.Consumer.parse_authz` returns an unverified IdToken. The verification of the token was left to the discretion of the implementator. 4) `iat` claim was not checked for sanity (i.e. it could be in the future) ### Patches 1) IdToken signature is now always checked. 2) JWA `none` algorithm is now allowed only if using the `response_type` `code` 3) IdToken verification is now done automatically. 4) `iat` claim is now checked for sanity.
Metadata
Created: 2020-12-04T16:47:12Z
Modified: 2024-10-07T21:07:21Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/12/GHSA-4fjv-pmhg-3rfg/GHSA-4fjv-pmhg-3rfg.json
CWE IDs: ["CWE-325", "CWE-347"]
Alternative ID: GHSA-4fjv-pmhg-3rfg
Finding: F052
Auto approve: 1