Description
It was found that various OpenID Providers (OPs) had TLS Server Certificates that used weak keys, as a result of the Debian Predictable Random Number Generator (CVE-2008-0166). In combination with the DNS Cache Poisoning issue (CVE-2008-1447) and the fact that almost all SSL/TLS implementations do not consult CRLs (currently an untracked issue), this means that it is impossible to rely on these OPs.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by WarCat team · pythonremotelinux
https://www.exploit-db.com/exploits/5720
Scores
CVSS v3
5.9
EPSS
0.0592
EPSS Percentile
90.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
CWE
CWE-338
Status
published
Products (1)
openid/openid
Published
May 21, 2021
Tracked Since
Feb 18, 2026