Lucene search

K
githubGitHub Advisory DatabaseGHSA-W8VH-P74J-X9XP
HistoryDec 18, 2023 - 8:01 p.m.

yii2-authclient vulnerable to possible timing attack on string comparison in OAuth1, OAuth2 and OpenID Connect implementation

2023-12-1820:01:00
CWE-203
GitHub Advisory Database
github.com
7
vulnerability
oauth
yii2
timing attack
string comparison
security

7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

26.1%

Impact

What kind of vulnerability is it? Who is impacted?

Original Report:

> The Oauth1/2 “state” and OpenID Connect “nonce” is vulnerable for a “timing attack” since it’s compared via regular string
> comparison (instead of Yii::$app->getSecurity()->compareString()).

Affected Code:

  1. OAuth 1 “state”

    https://github.com/yiisoft/yii2-authclient/blob/0d1c3880f4d79e20aa1d77c012650b54e69695ff/src/OAuth1.php#L158

  2. OAuth 2 “state”

    https://github.com/yiisoft/yii2-authclient/blob/0d1c3880f4d79e20aa1d77c012650b54e69695ff/src/OAuth2.php#L121

  3. OpenID Connect “nonce”

    https://github.com/yiisoft/yii2-authclient/blob/0d1c3880f4d79e20aa1d77c012650b54e69695ff/src/OpenIdConnect.php#L420

Patches

Has the problem been patched? What versions should users upgrade to?

TBD: Replace strcmp with Yii::$app->getSecurity()->compareString()).

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading?

not as far as I see.

References

Are there any links users can visit to find out more?

CPENameOperatorVersion
yiisoft/yii2-authclientle2.2.14

7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

26.1%

Related for GHSA-W8VH-P74J-X9XP