Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Issue with insecure django-oauth-toolkit library #2353

Closed
panosangelopoulos opened this issue Apr 1, 2022 · 10 comments
Closed

Issue with insecure django-oauth-toolkit library #2353

panosangelopoulos opened this issue Apr 1, 2022 · 10 comments
Assignees

Comments

@panosangelopoulos
Copy link

After the latest update of the insecure.json file the Django-oauth-toolkit fails for below 2.0.0

Unfortunately, the django-oauth-toolkit latest version is 1.7.1.

Perhaps there is an error on that.

Links:
https://pypi.org/project/django-oauth-toolkit/#history
https://github.com/pyupio/safety-db/blob/master/data/insecure.json#L1841

@SCH227
Copy link

SCH227 commented Apr 2, 2022

Good day, how are you?

The latest version of django-oauth-toolkit is affected by two vulnerabilities:
jazzband/django-oauth-toolkit#1124
jazzband/django-oauth-toolkit#1093

The issues have been tagged Milestone 2.0.0 (check also the links above). That's why we decided to warn our users about this with the specs range <2.0.0.

Thank you for contacting us. Here we are if anything else!

@SCH227 SCH227 closed this as completed Apr 2, 2022
@panosangelopoulos
Copy link
Author

@SCH227 Thanks a lot for your message
It seems both of them merged into master and were included in the 1.7.1 release of django-oauth-toolkit.

Perhaps it's fine to change it from 2.0.0 to 1.7.1

@SCH227
Copy link

SCH227 commented Apr 5, 2022

@panosangelopoulos according to this, they weren't included:

https://github.com/jazzband/django-oauth-toolkit/commits/1.7.1

@n2ygk
Copy link

n2ygk commented Apr 5, 2022

These are security BCP breaking changes-- not vulnerabilities. OAuth2 best practices have evolved over time.

@n2ygk
Copy link

n2ygk commented Apr 5, 2022

@SCH227 This is not a vulnerability but best common practice (BCP) that we are moving toward. Please remove this from safety db. Use of oob is still supported by Google for 2 more weeks and hashing client secrets is a "good to have" but not an exposure.

@panosangelopoulos
Copy link
Author

@n2ygk Absolutely agree; it's not a security issue but a best practice suggestion.
@SCH227 Shall I create a PR to drop it from the insecure.json file?

@SCH227
Copy link

SCH227 commented Apr 5, 2022

@panosangelopoulos @n2ygk, I understand your concern.
However, we also choose to report when best common practices aren't followed.
A user may decide later that these issues don't represent a risk for their application and follow to ignore them using the --ignore flag. But to make the best decision, they need first to be informed.

Here are good resources on why these issues can be a risk:

jazzband/django-oauth-toolkit#1104
[especially the links in "Additional context"]

jazzband/django-oauth-toolkit#729
[consider too that most data breaches that leak passwords happen because of secrets stored in plaintext or weak hashing]

@n2ygk
Copy link

n2ygk commented Apr 5, 2022

The problem is that users can't distinguish between a BCP vs. an actual security issue (like a log4j) in this case. I guess you are forcing me to release 2.0 prematurely.

@simara-svatopluk
Copy link

I can only agree with @n2ygk . I'm a BFU, and what I see

  • CI job shows error
  • It instructs me to upgrade to >= 2.0.0
  • I want to upgrade
  • The version doesn't exist :-(

What? I (and 3 of my colleagues) are searching the internet what is going on and what shall we do....

We have the safety-db installed because we want to avoid security problems, now it fails for not-security related issue.

@SCH227
Copy link

SCH227 commented Apr 8, 2022

Update:

We have decided to remove these as vulnerabilities for now.
Part of the reason we've come to this decision is that right now it is quite hard to ignore or make exceptions about vulnerabilities using our Safety command-line tool. We are releasing soon a new version of our Safety CLI scanning tool that will make this much easier. When that happens, we will likely add these back as vulnerabilities, since there is precedence with other CVEs that plaintext storage of passwords can be considered something we want to warn our customers about.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants