It was found that various OpenID Providers (OPs) had TLS...
Moderate severity
Unreviewed
Published
Apr 21, 2022
to the GitHub Advisory Database
•
Updated Jan 27, 2023
Description
Published by the National Vulnerability Database
May 21, 2021
Published to the GitHub Advisory Database
Apr 21, 2022
Last updated
Jan 27, 2023
It was found that various OpenID Providers (OPs) had TLS Server Certificates that used weak keys, as a result of the Debian Predictable Random Number Generator (CVE-2008-0166). In combination with the DNS Cache Poisoning issue (CVE-2008-1447) and the fact that almost all SSL/TLS implementations do not consult CRLs (currently an untracked issue), this means that it is impossible to rely on these OPs.
References