In the OAuth library for nim prior to version 0.11, the `state` values generated by the `generateState` function do not have sufficient entropy. These can be successfully guessed by an attacker allowing them to perform a CSRF vs a user, associating the user's session with the attacker's protected resources. While `state` isn't exactly a cryptographic value, it should be generated in a cryptographically secure way. `generateState` should be using a CSPRNG. Version 0.11 modifies the `generateState` function to generate `state` values of at least 128 bits of entropy while using a CSPRNG.
Metrics
Affected Vendors & Products
References
History
Mon, 19 Aug 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 15 Aug 2024 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the OAuth library for nim prior to version 0.11, the `state` values generated by the `generateState` function do not have sufficient entropy. These can be successfully guessed by an attacker allowing them to perform a CSRF vs a user, associating the user's session with the attacker's protected resources. While `state` isn't exactly a cryptographic value, it should be generated in a cryptographically secure way. `generateState` should be using a CSPRNG. Version 0.11 modifies the `generateState` function to generate `state` values of at least 128 bits of entropy while using a CSPRNG. | |
Title | OAuth library for nim allows insecure generation of state values by generateState - entropy too low and uses regular PRNG instead of CSPRNG | |
Weaknesses | CWE-330 CWE-352 |
|
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-08-15T18:40:49.750Z
Updated: 2024-08-19T19:23:56.720Z
Reserved: 2024-08-02T14:13:04.615Z
Link: CVE-2024-42475
Vulnrichment
Updated: 2024-08-19T19:23:50.975Z
NVD
Status : Awaiting Analysis
Published: 2024-08-15T19:15:19.520
Modified: 2024-08-19T13:00:23.117
Link: CVE-2024-42475
Redhat
No data.