Bug 2128425 (CVE-2022-36087)

Summary: CVE-2022-36087 python-oauthlib: DoS when attacker provides malicious IPV6 URI
Product: [Other] Security Response Reporter: ybuenos
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: adudiak, bbuckingham, bcoca, bcourt, bdettelb, btotty, chousekn, cluster-maint, cmeyers, davidn, eglynn, ehelms, gblomqui, jburrell, jcammara, jhardy, jjoyce, jobarker, jschluet, jsherril, lhh, lzap, mabashia, mburns, mgarciac, mhulan, mmccune, ngalvin, nmoumoul, notting, oalbrigt, orabin, osapryki, pcreech, rchan, relrod, rhos-maint, rpetrell, sdoran, slinaber, smcdonal, spower, stcannon, tfister, tkuratom, tvignaud, vkumar
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: python-oauthlib 3.2.1 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in python-oauthlib. This flaw allows an attacker providing a malicious redirect URI to cause a denial of service to OAuthLib's web application.
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-05-09 15:15:44 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2128564, 2128823, 2128824, 2128825, 2128826, 2128827, 2128828, 2128829, 2128830, 2128832    
Bug Blocks: 2126057    

Description ybuenos 2022-09-20 13:53:00 UTC
OAuthLib is an implementation of the OAuth request-signing logic for Python 3.6+. In OAuthLib versions 3.1.1 until 3.2.1, an attacker providing malicious redirect uri can cause denial of service. An attacker can also leverage usage of `uri_validate` functions depending where it is used. OAuthLib applications using OAuth2.0 provider support or use directly `uri_validate` are affected by this issue. Version 3.2.1 contains a patch.

https://github.com/oauthlib/oauthlib/blob/2b8a44855a51ad5a5b0c348a08c2564a2e197ea2/oauthlib/uri_validate.py
https://github.com/oauthlib/oauthlib/releases/tag/v3.2.1
https://github.com/oauthlib/oauthlib/blob/d4bafd9f1d0eba3766e933b1ac598cbbf37b8914/oauthlib/oauth2/rfc6749/grant_types/base.py#L232
https://github.com/oauthlib/oauthlib/security/advisories/GHSA-3pgj-pg6c-r5p7
https://github.com/oauthlib/oauthlib/commit/2e40b412c844ecc4673c3fa3f72181f228bdbacd

Comment 7 errata-xmlrpc 2023-05-09 07:13:03 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:2161 https://access.redhat.com/errata/RHSA-2023:2161

Comment 8 Product Security DevOps Team 2023-05-09 15:15:40 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-36087