Bug 1007746 - (CVE-2013-4346) CVE-2013-4346 python-oauth2: _check_signature() ignores the nonce value when validating signed urls
CVE-2013-4346 python-oauth2: _check_signature() ignores the nonce value when ...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20130204,repor...
: Reopened, Security
Depends On: 1007766 1007767 1121874
Blocks: 1007764 1145400
  Show dependency treegraph
 
Reported: 2013-09-13 05:10 EDT by Ratul Gupta
Modified: 2015-08-12 17:54 EDT (History)
17 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
It was found that python-oauth2 did not properly verify the nonce of a signed URL. An attacker able to capture network traffic of a website using OAuth2 authentication could use this flaw to conduct replay attacks against that website.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2015-08-12 17:54:59 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Ratul Gupta 2013-09-13 05:10:15 EDT
It was found that _check_signature() in python-oauth2, an application for authorization flows for web application, ignored the nonce values when validating signed urls. This could allow MITM attackers to conduct replay attacks.

References:
http://www.openwall.com/lists/oss-security/2013/09/12/7
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722656
https://github.com/simplegeo/python-oauth2/issues/129
Comment 1 Ratul Gupta 2013-09-13 05:38:00 EDT
Created python-oauth2 tracking bugs for this issue:

Affects: fedora-all [bug 1007766]
Affects: epel-6 [bug 1007767]
Comment 4 Kurt Seifried 2014-07-22 03:30:16 EDT
CloudForms Management Engine no longer includes python-oauth2, so removing.
Comment 5 Fedora Update System 2014-09-26 05:04:32 EDT
python-oauth2-1.5.211-7.fc19 has been pushed to the Fedora 19 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 6 Fedora Update System 2014-09-26 05:06:26 EDT
python-oauth2-1.5.211-7.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 7 Fedora Update System 2014-09-27 05:51:15 EDT
python-oauth2-1.5.211-7.fc21 has been pushed to the Fedora 21 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 8 Fedora Update System 2014-10-28 02:43:47 EDT
python-oauth2-1.5.211-8.fc19 has been pushed to the Fedora 19 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 9 Fedora Update System 2014-10-28 02:46:05 EDT
python-oauth2-1.5.211-8.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 10 Fedora Update System 2014-10-28 06:57:34 EDT
python-oauth2-1.5.211-8.el6 has been pushed to the Fedora EPEL 6 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 11 Fedora Update System 2014-10-28 07:04:09 EDT
python-oauth2-1.5.211-8.el7 has been pushed to the Fedora EPEL 7 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 12 Fedora Update System 2014-11-01 12:22:10 EDT
python-oauth2-1.5.211-8.fc21 has been pushed to the Fedora 21 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 14 errata-xmlrpc 2015-08-12 00:51:48 EDT
This issue has been addressed in the following products:

  Red Hat Satellite 6.1

Via RHSA-2015:1591 https://access.redhat.com/errata/RHSA-2015:1591
Comment 15 errata-xmlrpc 2015-08-12 01:07:26 EDT
This issue has been addressed in the following products:

  Red Hat Satellite 6.1

Via RHSA-2015:1592 https://access.redhat.com/errata/RHSA-2015:1592

Note You need to log in before you can comment on or make changes to this bug.