First published: Thu Apr 18 2019(Updated: )
** DISPUTED ** CertificatePinner.java in OkHttp 3.x through 3.12.0 allows man-in-the-middle attackers to bypass certificate pinning by changing SSLContext and the boolean values while hooking the application. NOTE: This id is disputed because some parties don't consider this is a vulnerability. Their rationale can be found in https://github.com/square/okhttp/issues/4967.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Squareup Okhttp | >=3.0.0<=3.12.0 | |
>=3.0.0<=3.12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-20200 is a vulnerability in OkHttp 3.x through 3.12.0 that allows man-in-the-middle attackers to bypass certificate pinning.
CVE-2018-20200 has a severity rating of 5.9, which is considered medium.
The affected software for CVE-2018-20200 is OkHttp versions 3.0.0 through 3.12.0.
An attacker can exploit CVE-2018-20200 by changing the SSLContext and boolean values while hooking the application to bypass certificate pinning.
Yes, you can find references for CVE-2018-20200 at the following links: [link 1](https://cxsecurity.com/issue/WLB-2018120252), [link 2](https://github.com/square/okhttp/commits/master), [link 3](https://github.com/square/okhttp/issues/4967).