// For flags

CVE-2020-26244

Cryptographic issues in Python oic

Severity Score

6.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Python oic is a Python OpenID Connect implementation. In Python oic before version 1.2.1, there are several related cryptographic issues affecting client implementations that use the library. The issues are: 1) The IdToken signature algorithm was not checked automatically, but only if the expected algorithm was passed in as a kwarg. 2) JWA `none` algorithm was allowed in all flows. 3) oic.consumer.Consumer.parse_authz returns an unverified IdToken. The verification of the token was left to the discretion of the implementator. 4) iat claim was not checked for sanity (i.e. it could be in the future). These issues are patched in version 1.2.1.

Python oic es una implementación de Python OpenID Connect. En Python oic versiones anteriores a 1.2.1, se presentan varios problemas criptográficos relacionados que afectan las implementaciones de los clientes que usan la biblioteca. Los problemas son: 1) El algoritmo de firma IdToken no se comprobó automáticamente, sino solo si el algoritmo esperado era pasado como un kwarg. 2) Se permitió el algoritmo JWA "none" en todos los flujos. 3) oic.consumer.Consumer.parse_authz devuelve un IdToken no verificado. La comprobación del token se dejó a discreción del implementador. 4) el reclamo de iat no se comprobó por sanidad (es decir, podría ser en el futuro). Estos problemas están parcheados en la versión 1.2.1

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-10-01 CVE Reserved
  • 2020-12-02 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-325: Missing Cryptographic Step
  • CWE-347: Improper Verification of Cryptographic Signature
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Python Openid Connect Project
Search vendor "Python Openid Connect Project"
Python Openid Connect
Search vendor "Python Openid Connect Project" for product "Python Openid Connect"
< 1.2.1
Search vendor "Python Openid Connect Project" for product "Python Openid Connect" and version " < 1.2.1"
-
Affected