Lookup for vulnerable packages by Package URL.

Purlpkg:maven/com.google.oauth-client/google-oauth-client@1.30.5
Typemaven
Namespacecom.google.oauth-client
Namegoogle-oauth-client
Version1.30.5
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.33.3
Latest_non_vulnerable_version1.33.3
Affected_by_vulnerabilities
0
url VCID-pwtj-az3g-zka3
vulnerability_id VCID-pwtj-az3g-zka3
summary
Improper Authorization in Google OAuth Client
PKCE support is not implemented in accordance with the RFC for OAuth 2.0 for Native Apps. Without the use of PKCE, the authorization code returned by an authorization server is not enough to guarantee that the client that issued the initial authorization request is the one that will be authorized. An attacker is able to obtain the authorization code using a malicious app on the client-side and use it to gain authorization to the protected resource. This affects the package com.google.oauth-client:google-oauth-client before 1.31.0.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7692.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7692.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-7692
reference_id
reference_type
scores
0
value 0.00084
scoring_system epss
scoring_elements 0.24266
published_at 2026-04-29T12:55:00Z
1
value 0.00084
scoring_system epss
scoring_elements 0.24307
published_at 2026-04-26T12:55:00Z
2
value 0.00084
scoring_system epss
scoring_elements 0.24322
published_at 2026-04-24T12:55:00Z
3
value 0.00084
scoring_system epss
scoring_elements 0.24435
published_at 2026-04-21T12:55:00Z
4
value 0.00084
scoring_system epss
scoring_elements 0.2446
published_at 2026-04-18T12:55:00Z
5
value 0.00084
scoring_system epss
scoring_elements 0.24465
published_at 2026-04-16T12:55:00Z
6
value 0.00084
scoring_system epss
scoring_elements 0.2445
published_at 2026-04-13T12:55:00Z
7
value 0.00084
scoring_system epss
scoring_elements 0.24508
published_at 2026-04-12T12:55:00Z
8
value 0.00084
scoring_system epss
scoring_elements 0.24552
published_at 2026-04-11T12:55:00Z
9
value 0.00084
scoring_system epss
scoring_elements 0.24536
published_at 2026-04-09T12:55:00Z
10
value 0.00084
scoring_system epss
scoring_elements 0.24493
published_at 2026-04-08T12:55:00Z
11
value 0.00084
scoring_system epss
scoring_elements 0.24424
published_at 2026-04-07T12:55:00Z
12
value 0.00084
scoring_system epss
scoring_elements 0.24649
published_at 2026-04-04T12:55:00Z
13
value 0.00084
scoring_system epss
scoring_elements 0.24612
published_at 2026-04-02T12:55:00Z
14
value 0.00084
scoring_system epss
scoring_elements 0.24494
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-7692
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7692
3
reference_url https://github.com/googleapis/google-oauth-java-client
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/googleapis/google-oauth-java-client
4
reference_url https://github.com/googleapis/google-oauth-java-client/commit/13433cd7dd06267fc261f0b1d4764f8e3432c824
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/googleapis/google-oauth-java-client/commit/13433cd7dd06267fc261f0b1d4764f8e3432c824
5
reference_url https://github.com/googleapis/google-oauth-java-client/issues/469
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/googleapis/google-oauth-java-client/issues/469
6
reference_url https://lists.apache.org/thread.html/r3db6ac73e0558d64f0b664f2fa4ef0a865e57c5de20f8321d3b48678@%3Ccommits.druid.apache.org%3E
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/r3db6ac73e0558d64f0b664f2fa4ef0a865e57c5de20f8321d3b48678@%3Ccommits.druid.apache.org%3E
7
reference_url https://lists.apache.org/thread.html/reae8909b264d1103f321b9ce1623c10c1ddc77dba9790247f2c0c90f@%3Ccommits.druid.apache.org%3E
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/reae8909b264d1103f321b9ce1623c10c1ddc77dba9790247f2c0c90f@%3Ccommits.druid.apache.org%3E
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-7692
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-7692
9
reference_url https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEOAUTHCLIENT-575276
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEOAUTHCLIENT-575276
10
reference_url https://tools.ietf.org/html/rfc7636%23section-1
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://tools.ietf.org/html/rfc7636%23section-1
11
reference_url https://tools.ietf.org/html/rfc8252%23section-8.1
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://tools.ietf.org/html/rfc8252%23section-8.1
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1856376
reference_id 1856376
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1856376
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988944
reference_id 988944
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988944
14
reference_url https://github.com/advisories/GHSA-f263-c949-w85g
reference_id GHSA-f263-c949-w85g
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-f263-c949-w85g
15
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
16
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
17
reference_url https://access.redhat.com/errata/RHSA-2023:3299
reference_id RHSA-2023:3299
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3299
18
reference_url https://access.redhat.com/errata/RHSA-2023:6172
reference_id RHSA-2023:6172
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6172
19
reference_url https://access.redhat.com/errata/RHSA-2024:0778
reference_id RHSA-2024:0778
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0778
fixed_packages
0
url pkg:maven/com.google.oauth-client/google-oauth-client@1.31.0
purl pkg:maven/com.google.oauth-client/google-oauth-client@1.31.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-wyyt-3d6v-qbc4
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/com.google.oauth-client/google-oauth-client@1.31.0
aliases CVE-2020-7692, GHSA-f263-c949-w85g
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pwtj-az3g-zka3
1
url VCID-wyyt-3d6v-qbc4
vulnerability_id VCID-wyyt-3d6v-qbc4
summary
google-oauth-java-client improperly verifies cryptographic signature
### Summary
The vulnerability impacts only users of the `IdTokenVerifier` class. The verify method in `IdTokenVerifier` does not validate the signature before verifying the claims (e.g., iss, aud, etc.). Signature verification makes sure that the token's payload comes from valid provider, not from someone else.

An attacker can provide a compromised token with modified payload like email or phone number. The token will pass the validation by the library. Once verified, modified payload can be used by the application. 

If the application sends verified `IdToken` to other service as is like for auth - the risk is low, because the backend of the service is expected to check the signature and fail the request. 

Reporter: [Tamjid al Rahat](https://github.com/tamjidrahat), contributor

### Patches
The issue was fixed in the 1.33.3 version of the library

### Proof of Concept
To reproduce, one needs to call the verify function with an IdToken instance that contains a malformed signature to successfully bypass the checks inside the verify function.

```
  /** A default http transport factory for testing */
  static class DefaultHttpTransportFactory implements HttpTransportFactory {
    public HttpTransport create() {
      return new NetHttpTransport();
    }
  }

// The below token has some modified bits in the signature
 private static final String SERVICE_ACCOUNT_RS256_TOKEN_BAD_SIGNATURE =    
"eyJhbGciOiJSUzI1NiIsImtpZCI6IjJlZjc3YjM4YTFiMDM3MDQ4NzA0MzkxNmFjYmYyN2Q3NG" +
"VkZDA4YjEiLCJ0eXAiOiJKV1QifQ.eyJhdWQiOiJodHRwczovL2V4YW1wbGUuY29tL2F1ZGllbm" +
"NlIiwiZXhwIjoxNTg3NjMwNTQzLCJpYXQiOjE1ODc2MjY5NDMsImlzcyI6InNvbWUgaXNzdWVy" +
"Iiwic3ViIjoic29tZSBzdWJqZWN0In0.gGOQW0qQgs4jGUmCsgRV83RqsJLaEy89-ZOG6p1u0Y26" +
"FyY06b6Odgd7xXLsSTiiSnch62dl0Lfi9D0x2ByxvsGOCbovmBl2ZZ0zHr1wpc4N0XS9lMUq5RJ" + 
"QbonDibxXG4nC2zroDfvD0h7i-L8KMXeJb9pYwW7LkmrM_YwYfJnWnZ4bpcsDjojmPeUBlACg7tjjOgBFby" +
"QZvUtaERJwSRlaWibvNjof7eCVfZChE0PwBpZc_cGqSqKXv544L4ttqdCnm0NjqrTATXwC4gYx" + 
"ruevkjHfYI5ojcQmXoWDJJ0-_jzfyPE4MFFdCFgzLgnfIOwe5ve0MtquKuv2O0pgvg";

IdTokenVerifier tokenVerifier =
        new IdTokenVerifier.Builder()
            .setClock(clock)
            .setCertificatesLocation("https://www.googleapis.com/robot/v1/metadata/x509/integration-tests%40chingor-test.iam.gserviceaccount.com")
            .setHttpTransportFactory(new DefaultHttpTransportFactory())
            .build();

// verification will return true despite modified signature for versions <1.33.3
tokenVerifier.verify(IdToken.parse(GsonFactory.getDefaultInstance(), SERVICE_ACCOUNT_RS256_TOKEN_BAD_SIGNATURE));

```

### Remediation and Mitigation
Update to the version 1.33.3 or higher 

If the library used indirectly or cannot be updated for any reason you can use similar IdToken verifiers provided by Google that already has signature verification. For example: 
[google-auth-library-java](https://github.com/googleapis/google-auth-library-java/blob/main/oauth2_http/java/com/google/auth/oauth2/TokenVerifier.java)
[google-api-java-client](https://github.com/googleapis/google-api-java-client/blob/main/google-api-client/src/main/java/com/google/api/client/googleapis/auth/oauth2/GoogleIdTokenVerifier.java)

### Timeline
Date reported: 12 Dec 2021
Date fixed: 13 Apr 2022
Date disclosed: 2 May 2022

### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [google-oauth-java-client](https://github.com/googleapis/google-oauth-java-client) repo
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22573.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22573.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22573
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17164
published_at 2026-04-29T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17518
published_at 2026-04-04T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17298
published_at 2026-04-07T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17389
published_at 2026-04-08T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17449
published_at 2026-04-09T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17461
published_at 2026-04-11T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17414
published_at 2026-04-12T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17358
published_at 2026-04-13T12:55:00Z
8
value 0.00055
scoring_system epss
scoring_elements 0.17299
published_at 2026-04-16T12:55:00Z
9
value 0.00055
scoring_system epss
scoring_elements 0.17307
published_at 2026-04-18T12:55:00Z
10
value 0.00055
scoring_system epss
scoring_elements 0.17338
published_at 2026-04-21T12:55:00Z
11
value 0.00055
scoring_system epss
scoring_elements 0.17245
published_at 2026-04-24T12:55:00Z
12
value 0.00055
scoring_system epss
scoring_elements 0.17224
published_at 2026-04-26T12:55:00Z
13
value 0.00055
scoring_system epss
scoring_elements 0.17303
published_at 2026-04-01T12:55:00Z
14
value 0.00055
scoring_system epss
scoring_elements 0.17471
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22573
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22573
3
reference_url https://github.com/googleapis/google-oauth-java-client
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/googleapis/google-oauth-java-client
4
reference_url https://github.com/googleapis/google-oauth-java-client/commit/c634ad4e31cac322bb1aa8a9feb0569749011bf0
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/googleapis/google-oauth-java-client/commit/c634ad4e31cac322bb1aa8a9feb0569749011bf0
5
reference_url https://github.com/googleapis/google-oauth-java-client/pull/872
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/googleapis/google-oauth-java-client/pull/872
6
reference_url https://github.com/googleapis/google-oauth-java-client/security/advisories/GHSA-hw42-3568-wj87
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/googleapis/google-oauth-java-client/security/advisories/GHSA-hw42-3568-wj87
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-22573
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-22573
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010657
reference_id 1010657
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010657
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2081879
reference_id 2081879
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2081879
10
reference_url https://github.com/advisories/GHSA-hw42-3568-wj87
reference_id GHSA-hw42-3568-wj87
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-hw42-3568-wj87
11
reference_url https://access.redhat.com/errata/RHSA-2022:4932
reference_id RHSA-2022:4932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4932
12
reference_url https://access.redhat.com/errata/RHSA-2022:5030
reference_id RHSA-2022:5030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5030
13
reference_url https://access.redhat.com/errata/RHSA-2022:5532
reference_id RHSA-2022:5532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5532
14
reference_url https://access.redhat.com/errata/RHSA-2022:7177
reference_id RHSA-2022:7177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7177
fixed_packages
0
url pkg:maven/com.google.oauth-client/google-oauth-client@1.33.3
purl pkg:maven/com.google.oauth-client/google-oauth-client@1.33.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/com.google.oauth-client/google-oauth-client@1.33.3
aliases CVE-2021-22573, GHSA-hw42-3568-wj87
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wyyt-3d6v-qbc4
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/com.google.oauth-client/google-oauth-client@1.30.5