SSL Certificate Bypass Affecting starscreamfork package, versions <2.0.4


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.18% (56th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-COCOAPODS-STARSCREAMFORK-472369
  • published9 Oct 2019
  • disclosed6 Apr 2017
  • creditUnknown

Introduced: 6 Apr 2017

CVE-2017-5887  (opens in a new tab)
CWE-295  (opens in a new tab)

How to fix?

Upgrade StarscreamFork to version 2.0.4 or higher.

Overview

StarscreamFork is a fork of Starscream, a conforming WebSocket (RFC 6455) client library in Swift for iOS and OSX.

Affected versions of this package are vulnerable to SSL Certificate Bypass. WebSocket.swift allows an SSL Pinning bypass because pinning occurs in the stream function (this is too late; pinning should occur in the initStreamsWithData function).

CVSS Scores

version 3.1