Loading HuntDB...

GHSA-w8vh-p74j-x9xp

GitHub Security Advisory

yii2-authclient vulnerable to possible timing attack on string comparison in OAuth1, OAuth2 and OpenID Connect implementation

✓ GitHub Reviewed LOW Has CVE

Advisory Details

### Impact
_What kind of vulnerability is it? Who is impacted?_

Original Report:

> The Oauth1/2 "state" and OpenID Connect "nonce" is vulnerable for a "timing attack" since it's compared via regular string
> comparison (instead of `Yii::$app->getSecurity()->compareString()`).

Affected Code:

1. OAuth 1 "state"

https://github.com/yiisoft/yii2-authclient/blob/0d1c3880f4d79e20aa1d77c012650b54e69695ff/src/OAuth1.php#L158

3. OAuth 2 "state"

https://github.com/yiisoft/yii2-authclient/blob/0d1c3880f4d79e20aa1d77c012650b54e69695ff/src/OAuth2.php#L121

4. OpenID Connect "nonce"

https://github.com/yiisoft/yii2-authclient/blob/0d1c3880f4d79e20aa1d77c012650b54e69695ff/src/OpenIdConnect.php#L420

### Patches
_Has the problem been patched? What versions should users upgrade to?_

TBD: Replace strcmp with `Yii::$app->getSecurity()->compareString()`).

### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_

not as far as I see.

### References
_Are there any links users can visit to find out more?_

Affected Packages

Packagist yiisoft/yii2-authclient
Affected versions: 0 (fixed in 2.2.15)

Related CVEs

Key Information

GHSA ID
GHSA-w8vh-p74j-x9xp
Published
December 18, 2023 8:01 PM
Last Modified
December 22, 2023 10:23 PM
CVSS Score
2.5 /10
Primary Ecosystem
Packagist
Primary Package
yiisoft/yii2-authclient
GitHub Reviewed
✓ Yes

Dataset

Last updated: September 10, 2025 6:31 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.