Guzzle OAuth Subscriber signs Guzzle requests using OAuth 1.0. Prior to 0.8.1, Nonce generation does not use sufficient entropy nor a cryptographically secure pseudorandom source. This can leave servers vulnerable to replay attacks when TLS is not used. This vulnerability is fixed in 0.8.1.
CVSS
No CVSS.
References
Configurations
No configuration.
History
06 Jan 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-06 20:15
Updated : 2025-01-06 20:15
NVD link : CVE-2025-21617
Mitre link : CVE-2025-21617
CVE.ORG link : CVE-2025-21617
JSON object : View
Products Affected
No product.
CWE
CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)