Guzzle OAuth Subscriber signs Guzzle requests using OAuth 1.0. Prior to 0.8.1, Nonce generation does not use sufficient entropy nor a cryptographically secure pseudorandom source. This can leave servers vulnerable to replay attacks when TLS is not used. This vulnerability is fixed in 0.8.1.
Metrics
Affected Vendors & Products
References
History
Mon, 06 Jan 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 06 Jan 2025 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Guzzle OAuth Subscriber signs Guzzle requests using OAuth 1.0. Prior to 0.8.1, Nonce generation does not use sufficient entropy nor a cryptographically secure pseudorandom source. This can leave servers vulnerable to replay attacks when TLS is not used. This vulnerability is fixed in 0.8.1. | |
Title | Guzzle OAuth Subscriber has insufficient nonce entropy | |
Weaknesses | CWE-338 | |
References |
|
|
Metrics |
cvssV4_0
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-01-06T19:23:23.232Z
Updated: 2025-01-06T19:42:17.597Z
Reserved: 2024-12-29T03:00:24.713Z
Link: CVE-2025-21617
Vulnrichment
Updated: 2025-01-06T19:42:13.946Z
NVD
Status : Received
Published: 2025-01-06T20:15:39.453
Modified: 2025-01-06T20:15:39.453
Link: CVE-2025-21617
Redhat
No data.