{"id":"UBUNTU-CVE-2022-36087","details":"OAuthLib is an implementation of the OAuth request-signing logic for Python 3.6+. In OAuthLib versions 3.1.1 until 3.2.1, an attacker providing malicious redirect uri can cause denial of service. An attacker can also leverage usage of `uri_validate` functions depending where it is used. OAuthLib applications using OAuth2.0 provider support or use directly `uri_validate` are affected by this issue. Version 3.2.1 contains a patch. There are no known workarounds.","modified":"2026-02-04T02:27:06.645315Z","published":"2022-09-09T21:15:00Z","related":["USN-5632-1"],"upstream":["CVE-2022-36087"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-36087"},{"type":"REPORT","url":"https://github.com/oauthlib/oauthlib/security/advisories/GHSA-3pgj-pg6c-r5p7"},{"type":"REPORT","url":"https://github.com/oauthlib/oauthlib/releases/tag/v3.2.1"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5632-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2022-36087"}],"affected":[{"package":{"name":"python-oauthlib","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/python-oauthlib@3.2.0-1ubuntu0.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.2.0-1ubuntu0.1"}]}],"versions":["3.1.0-2","3.1.1-1","3.2.0-1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"3.2.0-1ubuntu0.1","binary_name":"python3-oauthlib"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-36087.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}