SSL Certificate Bypass Affecting starscreamsocketio package, versions <2.0.4


0.0
high
  • Attack Complexity

    Low

  • Integrity

    High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-COCOAPODS-STARSCREAMSOCKETIO-472364

  • published

    9 Oct 2019

  • disclosed

    6 Apr 2017

  • credit

    Unknown

How to fix?

Upgrade StarscreamSocketIO to version 2.0.4 or higher.

Overview

StarscreamSocketIO is a fork of Starscream, a conforming WebSocket (RFC 6455) client library in Swift for iOS and OSX.

Affected versions of this package are vulnerable to SSL Certificate Bypass. Allows an SSL Pinning bypass because of incorrect management of the certValidated variable (it can be set to true but cannot be set to false). If an attacker in a man-in-the-middle position is able to reset an established TCP connection between the client and server, the subsequent re-connection will not pin the SSL certificate, allowing traffic interception.