Home

Description

Guzzle OAuth Subscriber signs Guzzle requests using OAuth 1.0. Prior to 0.8.1, Nonce generation does not use sufficient entropy nor a cryptographically secure pseudorandom source. This can leave servers vulnerable to replay attacks when TLS is not used. This vulnerability is fixed in 0.8.1.

PUBLISHED Reserved 2024-12-29 | Published 2025-01-06 | Updated 2025-01-06 | Assigner GitHub_M




MEDIUM: 6.3CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

Product status

< 0.8.1
affected

References

github.com/...criber/security/advisories/GHSA-237r-r8m4-4q88

github.com/...ommit/92b619b03bd21396e51c62e6bce83467d2ce8f53

github.com/guzzle/oauth-subscriber/blob/0.8.0/src/Oauth1.php

github.com/guzzle/oauth-subscriber/releases/tag/0.8.1

cve.org (CVE-2025-21617)

nvd.nist.gov (CVE-2025-21617)

Download JSON