Nixpkgs security tracker

Login with GitHub

Suggestions search

With package: python312Packages.authlib

Found 2 matching suggestions

View:
Compact
Detailed
Permalink CVE-2026-41425
5.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 4 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse ignored
    15 packages
    • python312Packages.oauthlib
    • python313Packages.oauthlib
    • python314Packages.oauthlib
    • python312Packages.hawkauthlib
    • python313Packages.hawkauthlib
    • python314Packages.hawkauthlib
    • python312Packages.aiohttp-oauthlib
    • python313Packages.aiohttp-oauthlib
    • python314Packages.aiohttp-oauthlib
    • python312Packages.requests-oauthlib
    • python313Packages.requests-oauthlib
    • python314Packages.requests-oauthlib
    • python312Packages.google-auth-oauthlib
    • python313Packages.google-auth-oauthlib
    • python314Packages.google-auth-oauthlib
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Authlib: Cross-site request forging when using cache

Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to 1.6.11, there is no CSRF protection on the cache feature in authlib.integrations.starlette_client.OAuth. This vulnerability is fixed in 1.6.11.

Affected products

authlib
  • ==< 1.6.11

Matching in nixpkgs

Ignored packages (15)

Package maintainers

updated 1 month, 2 weeks ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt ignored
    15 packages
    • python314Packages.google-auth-oauthlib
    • python313Packages.google-auth-oauthlib
    • python312Packages.google-auth-oauthlib
    • python314Packages.requests-oauthlib
    • python313Packages.requests-oauthlib
    • python312Packages.requests-oauthlib
    • python314Packages.aiohttp-oauthlib
    • python313Packages.aiohttp-oauthlib
    • python312Packages.aiohttp-oauthlib
    • python314Packages.hawkauthlib
    • python313Packages.hawkauthlib
    • python312Packages.hawkauthlib
    • python314Packages.oauthlib
    • python313Packages.oauthlib
    • python312Packages.oauthlib
  • @mweinelt accepted
  • @mweinelt published on GitHub
Authlib: Setting `alg: none` and a blank signature appears to bypass signature verification

Authlib is a Python library which builds OAuth and OpenID Connect servers. From version 1.6.5 to before version 1.6.7, previous tests involving passing a malicious JWT containing alg: none and an empty signature was passing the signature verification step without any changes to the application code when a failure was expected.. This issue has been patched in version 1.6.7.

Affected products

authlib
  • ==>= 1.6.5, < 1.6.7

Matching in nixpkgs

Ignored packages (15)

Package maintainers

https://github.com/authlib/authlib/security/advisories/GHSA-7wc2-qxgw-g8gg
https://github.com/authlib/authlib/commit/a61c2acb807496e67f32051b5f1b1d5ccf8f0a75
https://github.com/authlib/authlib/commit/b87c32ed07b8ae7f805873e1c9cafd1016761df7