SSL Certificate Bypass Affecting starscreamsocketio package, versions <2.0.4


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.18% (55th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-COCOAPODS-STARSCREAMSOCKETIO-472364
  • published 9 Oct 2019
  • disclosed 6 Apr 2017
  • credit Unknown

How to fix?

Upgrade StarscreamSocketIO to version 2.0.4 or higher.

Overview

StarscreamSocketIO is a fork of Starscream, a conforming WebSocket (RFC 6455) client library in Swift for iOS and OSX.

Affected versions of this package are vulnerable to SSL Certificate Bypass. Allows an SSL Pinning bypass because of incorrect management of the certValidated variable (it can be set to true but cannot be set to false). If an attacker in a man-in-the-middle position is able to reset an established TCP connection between the client and server, the subsequent re-connection will not pin the SSL certificate, allowing traffic interception.

CVSS Scores

version 3.1
Expand this section

Snyk

7.5 high
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    None
  • Integrity (I)
    High
  • Availability (A)
    None
Expand this section

NVD

7.5 high