SSL Certificate Bypass Affecting starscreamhb Open this link in a new tab package, versions <2.0.4
Attack Complexity
Low
Integrity
High
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications-
snyk-id
SNYK-COCOAPODS-STARSCREAMHB-472365
-
published
9 Oct 2019
-
disclosed
6 Apr 2017
-
credit
Unknown
Introduced: 6 Apr 2017
CVE-2017-7192 Open this link in a new tabHow to fix?
Upgrade StarscreamHB
to version 2.0.4 or higher.
Overview
StarscreamHB is a fork of Starscream, a conforming WebSocket (RFC 6455) client library in Swift for iOS and OSX.
Affected versions of this package are vulnerable to SSL Certificate Bypass. Allows an SSL Pinning bypass because of incorrect management of the certValidated
variable (it can be set to true but cannot be set to false). If an attacker in a man-in-the-middle position is able to reset an established TCP connection between the client and server, the subsequent re-connection will not pin the SSL certificate, allowing traffic interception.