SSL Certificate Bypass Affecting starscreamfork package, versions <2.0.4


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.18% (56th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-COCOAPODS-STARSCREAMFORK-472366
  • published9 Oct 2019
  • disclosed6 Apr 2017
  • creditUnknown

Introduced: 6 Apr 2017

CVE-2017-7192  (opens in a new tab)
CWE-295  (opens in a new tab)

How to fix?

Upgrade StarscreamFork to version 2.0.4 or higher.

Overview

StarscreamFork is a fork of Starscream, a conforming WebSocket (RFC 6455) client library in Swift for iOS and OSX.

Affected versions of this package are vulnerable to SSL Certificate Bypass. Allows an SSL Pinning bypass because of incorrect management of the certValidated variable (it can be set to true but cannot be set to false). If an attacker in a man-in-the-middle position is able to reset an established TCP connection between the client and server, the subsequent re-connection will not pin the SSL certificate, allowing traffic interception.

CVSS Scores

version 3.1