Guzzle OAuth Subscriber has insufficient nonce entropy
Moderate severity
GitHub Reviewed
Published
Jan 6, 2025
in
guzzle/oauth-subscriber
•
Updated Jan 6, 2025
Description
Published to the GitHub Advisory Database
Jan 6, 2025
Reviewed
Jan 6, 2025
Published by the National Vulnerability Database
Jan 6, 2025
Last updated
Jan 6, 2025
Impact
Nonce generation does not use sufficient entropy nor a cryptographically secure pseudorandom source (https://github.com/guzzle/oauth-subscriber/blob/0.8.0/src/Oauth1.php#L192). This can leave servers vulnerable to replay attacks when TLS is not used.
Patches
Upgrade to version 0.8.1 or higher.
Workarounds
No.
References
Issue is similar to https://nvd.nist.gov/vuln/detail/CVE-2025-22376.
References