Description
Guzzle OAuth Subscriber signs Guzzle requests using OAuth 1.0. Prior to 0.8.1, Nonce generation does not use sufficient entropy nor a cryptographically secure pseudorandom source. This can leave servers vulnerable to replay attacks when TLS is not used. This vulnerability is fixed in 0.8.1.
Problem types
CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
Product status
References
github.com/...criber/security/advisories/GHSA-237r-r8m4-4q88
github.com/...ommit/92b619b03bd21396e51c62e6bce83467d2ce8f53
github.com/guzzle/oauth-subscriber/blob/0.8.0/src/Oauth1.php
github.com/guzzle/oauth-subscriber/releases/tag/0.8.1