Guzzle OAuth Subscriber signs Guzzle requests using OAuth 1.0. Prior to 0.8.1, Nonce generation does not use sufficient entropy nor a cryptographically secure pseudorandom source. This can leave servers vulnerable to replay attacks when TLS is not used. This vulnerability is fixed in 0.8.1.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-0003 | Guzzle OAuth Subscriber signs Guzzle requests using OAuth 1.0. Prior to 0.8.1, Nonce generation does not use sufficient entropy nor a cryptographically secure pseudorandom source. This can leave servers vulnerable to replay attacks when TLS is not used. This vulnerability is fixed in 0.8.1. |
Github GHSA |
GHSA-237r-r8m4-4q88 | Guzzle OAuth Subscriber has insufficient nonce entropy |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 06 Jan 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 06 Jan 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Guzzle OAuth Subscriber signs Guzzle requests using OAuth 1.0. Prior to 0.8.1, Nonce generation does not use sufficient entropy nor a cryptographically secure pseudorandom source. This can leave servers vulnerable to replay attacks when TLS is not used. This vulnerability is fixed in 0.8.1. | |
| Title | Guzzle OAuth Subscriber has insufficient nonce entropy | |
| Weaknesses | CWE-338 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-01-06T19:42:17.597Z
Reserved: 2024-12-29T03:00:24.713Z
Link: CVE-2025-21617
Updated: 2025-01-06T19:42:13.946Z
Status : Received
Published: 2025-01-06T20:15:39.453
Modified: 2025-01-06T20:15:39.453
Link: CVE-2025-21617
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA