Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

google-oauth-client-1.19.0.jar: 2 vulnerabilities (highest severity is: 8.7) #35

Open
mend-for-github-com bot opened this issue Feb 28, 2024 · 0 comments
Labels
Mend: dependency security vulnerability Security vulnerability detected by Mend

Comments

@mend-for-github-com
Copy link

mend-for-github-com bot commented Feb 28, 2024

Vulnerable Library - google-oauth-client-1.19.0.jar

Google OAuth Client Library for Java. Functionality that works on all supported Java platforms, including Java 5 (or higher) desktop (SE) and web (EE), Android, and Google App Engine.

Library home page: http://www.google.com/

Path to vulnerable library: /dev/cosbench-gcs/google-oauth-client-1.19.0.jar

Vulnerabilities

CVE Severity CVSS Exploit Maturity EPSS Dependency Type Fixed in (google-oauth-client version) Remediation Possible** Reachability
CVE-2021-22573 High 8.7 Not Defined 0.1% google-oauth-client-1.19.0.jar Direct 1.33.3
CVE-2020-7692 High 7.4 Not Defined 0.70000005% google-oauth-client-1.19.0.jar Direct 1.31.0

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2021-22573

Vulnerable Library - google-oauth-client-1.19.0.jar

Google OAuth Client Library for Java. Functionality that works on all supported Java platforms, including Java 5 (or higher) desktop (SE) and web (EE), Android, and Google App Engine.

Library home page: http://www.google.com/

Path to vulnerable library: /dev/cosbench-gcs/google-oauth-client-1.19.0.jar

Dependency Hierarchy:

  • google-oauth-client-1.19.0.jar (Vulnerable Library)

Found in base branch: master

Vulnerability Details

The vulnerability is that IDToken verifier does not verify if token is properly signed. Signature verification makes sure that the token's payload comes from valid provider, not from someone else. An attacker can provide a compromised token with custom payload. The token will pass the validation on the client side. We recommend upgrading to version 1.33.3 or above

Publish Date: 2022-05-03

URL: CVE-2021-22573

Threat Assessment

Exploit Maturity: Not Defined

EPSS: 0.1%

CVSS 3 Score Details (8.7)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22573

Release Date: 2022-05-03

Fix Resolution: 1.33.3

CVE-2020-7692

Vulnerable Library - google-oauth-client-1.19.0.jar

Google OAuth Client Library for Java. Functionality that works on all supported Java platforms, including Java 5 (or higher) desktop (SE) and web (EE), Android, and Google App Engine.

Library home page: http://www.google.com/

Path to vulnerable library: /dev/cosbench-gcs/google-oauth-client-1.19.0.jar

Dependency Hierarchy:

  • google-oauth-client-1.19.0.jar (Vulnerable Library)

Found in base branch: master

Vulnerability Details

PKCE support is not implemented in accordance with the RFC for OAuth 2.0 for Native Apps. Without the use of PKCE, the authorization code returned by an authorization server is not enough to guarantee that the client that issued the initial authorization request is the one that will be authorized. An attacker is able to obtain the authorization code using a malicious app on the client-side and use it to gain authorization to the protected resource. This affects the package com.google.oauth-client:google-oauth-client before 1.31.0.
Mend Note: Converted from WS-2020-0051, on 2021-08-19.

Publish Date: 2020-07-09

URL: CVE-2020-7692

Threat Assessment

Exploit Maturity: Not Defined

EPSS: 0.70000005%

CVSS 3 Score Details (7.4)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2020-07-09

Fix Resolution: 1.31.0

@mend-for-github-com mend-for-github-com bot added the Mend: dependency security vulnerability Security vulnerability detected by Mend label Feb 28, 2024
@mend-for-github-com mend-for-github-com bot changed the title google-oauth-client-1.19.0.jar: 2 vulnerabilities (highest severity is: 9.1) google-oauth-client-1.19.0.jar: 2 vulnerabilities (highest severity is: 8.7) Sep 8, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Mend: dependency security vulnerability Security vulnerability detected by Mend
Projects
None yet
Development

No branches or pull requests

0 participants