Guzzle OAuth Subscriber signs Guzzle requests using OAuth 1.0. Prior to 0.8.1, Nonce generation does not use sufficient entropy nor a cryptographically secure pseudorandom source. This can leave servers vulnerable to replay attacks when TLS is not used. This vulnerability is fixed in 0.8.1.
History

Mon, 06 Jan 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 06 Jan 2025 19:30:00 +0000

Type Values Removed Values Added
Description Guzzle OAuth Subscriber signs Guzzle requests using OAuth 1.0. Prior to 0.8.1, Nonce generation does not use sufficient entropy nor a cryptographically secure pseudorandom source. This can leave servers vulnerable to replay attacks when TLS is not used. This vulnerability is fixed in 0.8.1.
Title Guzzle OAuth Subscriber has insufficient nonce entropy
Weaknesses CWE-338
References
Metrics cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-01-06T19:23:23.232Z

Updated: 2025-01-06T19:42:17.597Z

Reserved: 2024-12-29T03:00:24.713Z

Link: CVE-2025-21617

cve-icon Vulnrichment

Updated: 2025-01-06T19:42:13.946Z

cve-icon NVD

Status : Received

Published: 2025-01-06T20:15:39.453

Modified: 2025-01-06T20:15:39.453

Link: CVE-2025-21617

cve-icon Redhat

No data.