Insecure Default Affecting afnetworking Open this link in a new tab package, versions <2.5.3
Attack Complexity
Low
User Interaction
Required
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications-
snyk-id
SNYK-COCOAPODS-AFNETWORKING-471246
-
published
2 Oct 2019
-
disclosed
27 Mar 2015
-
credit
Unknown
Introduced: 27 Mar 2015
CVE-2015-3996 Open this link in a new tabHow to fix?
Upgrade AFNetworking
to version 2.5.3 or higher.
Overview
AFNetworking is a delightful iOS and OS X networking framework.
Affected versions of this package are vulnerable to Insecure Default. The default AFSecurityPolicy.validatesDomainName
configuration for AFSSLPinningModeNone
in the AFNetworking framework
disables verification of a server hostname against the domain name in the subject's Common Name (CN) of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.