Lucene search

K
osvGoogleOSV:GHSA-3PGJ-PG6C-R5P7
HistorySep 16, 2022 - 9:02 p.m.

OAuthLib vulnerable to DoS when attacker provides malicious IPV6 URI

2022-09-1621:02:52
Google
osv.dev
11

0.003 Low

EPSS

Percentile

67.8%

Impact

  • Attacker providing malicious redirect uri can cause DoS to oauthlib’s web application.
  • Attacker can also leverage usage of uri_validate functions depending where it is used.

What kind of vulnerability is it? Who is impacted?

Oauthlib applications using OAuth2.0 provider support or use directly uri_validate function.

Patches

Has the problem been patched? What versions should users upgrade to?

Issue fixed in 3.2.2 release.

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading?

The redirect_uri can be verified in web toolkit (i.e bottle-oauthlib, django-oauth-toolkit, …) before oauthlib is called. A sample check if : is present to reject the request can prevent the DoS, assuming no port or IPv6 is fundamentally required.

References

Attack Vector:

PoC

is_absolute_uri("http://[:::::::::::::::::::::::::::::::::::::::]/path")

Acknowledgement

Special thanks to Sebastian Chnelik - PyUp.io

CPENameOperatorVersion
oauthlibeq3.1.1
oauthlibeq3.2.0
oauthlibeq3.2.1

References