First published: Tue Nov 28 2017(Updated: )
Twitter Kit for iOS versions 3.0 to 3.2.1 is vulnerable to a callback verification flaw in the "Login with Twitter" component allowing an attacker to provide alternate credentials. In the final step of "Login with Twitter" authentication information is passed back to the application using the registered custom URL scheme (typically twitterkit-<consumer-key>) on iOS. Because the callback handler did not verify the authenticity of the response, this step is vulnerable to forgery, potentially allowing attacker to associate a Twitter account with a third-party service.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Twitter Twitter Kit | >=3.0<=3.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-0911 has been classified as a medium severity vulnerability due to the potential exposure of user credentials.
To resolve CVE-2017-0911, update Twitter Kit for iOS to version 3.2.2 or later.
CVE-2017-0911 is a callback verification flaw that allows attackers to provide alternate credentials during Twitter authentication.
Twitter Kit for iOS versions 3.0 to 3.2.1 are affected by CVE-2017-0911.
Attackers can exploit CVE-2017-0911 to intercept and manipulate authentication information, potentially compromising user accounts.