CVE-2025-21617

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-21617
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-21617.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-21617
Aliases
Published
2025-01-06T20:15:39Z
Modified
2025-01-15T05:17:20.322457Z
Summary
[none]
Details

Guzzle OAuth Subscriber signs Guzzle requests using OAuth 1.0. Prior to 0.8.1, Nonce generation does not use sufficient entropy nor a cryptographically secure pseudorandom source. This can leave servers vulnerable to replay attacks when TLS is not used. This vulnerability is fixed in 0.8.1.

References

Affected packages

Git / github.com/guzzle/oauth-subscriber

Affected ranges

Type
GIT
Repo
https://github.com/guzzle/oauth-subscriber
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.1.0
0.1.1
0.1.2
0.2.0
0.3.0
0.4.0
0.5.0
0.6.0
0.7.0
0.8.0