The Server.verify_request function in SimpleGeo python-oauth2 does not check the nonce, which allows remote attackers to perform replay attacks via a signed URL.
The vulnerability does not appear to be patched according to the following discussion.
www.openwall.com/lists/oss-security/2013/09/12/7
access.redhat.com/errata/RHSA-2015:1591
access.redhat.com/errata/RHSA-2015:1592
access.redhat.com/security/cve/CVE-2013-4346
bugzilla.redhat.com/show_bug.cgi?id=1007746
github.com/joestump/python-oauth2
github.com/simplegeo/python-oauth2/issues/129
nvd.nist.gov/vuln/detail/CVE-2013-4346
web.archive.org/web/20200228063302/www.securityfocus.com/bid/62386