CVE-2020-7692

PKCE support is not implemented in accordance with the RFC for OAuth 2.0 for Native Apps. Without the use of PKCE, the authorization code returned by an authorization server is not enough to guarantee that the client that issued the initial authorization request is the one that will be authorized. An attacker is able to obtain the authorization code using a malicious app on the client-side and use it to gain authorization to the protected resource. This affects the package com.google.oauth-client:google-oauth-client before 1.31.0.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.4 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
snykCNA
7.4 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 25%
VendorProductVersion
googleoauth_client_library_for_java
𝑥
< 1.31.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
google-oauth-client-java
bullseye
1.28.0-2
fixed
bookworm
1.34.1-2
fixed
sid
1.34.1-2
fixed
trixie
1.34.1-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
google-oauth-client-java
noble
needs-triage
mantic
ignored
lunar
ignored
kinetic
ignored
jammy
needs-triage
impish
ignored
hirsute
ignored
groovy
ignored
focal
dne
eoan
dne
bionic
dne
xenial
dne
trusty
dne