CertificatePinner.java in OkHttp 3.x through 3.12.0 allows man-in-the-middle attackers to bypass certificate pinning by changing SSLContext and the boolean values while hooking the application. NOTE: This id is disputed because some parties dont consider this is a vulnerability. Their rationale can be found in https://github.com/square/okhttp/issues/4967
The product does not validate, or incorrectly validates, a certificate.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Okhttp | Squareup | 3.0.0 (including) | 3.12.0 (including) |
Libokhttp-java | Ubuntu | bionic | * |
Libokhttp-java | Ubuntu | cosmic | * |
Libokhttp-java | Ubuntu | disco | * |
Libokhttp-java | Ubuntu | eoan | * |
Libokhttp-java | Ubuntu | groovy | * |
Libokhttp-java | Ubuntu | hirsute | * |
Libokhttp-java | Ubuntu | impish | * |
Libokhttp-java | Ubuntu | kinetic | * |
Libokhttp-java | Ubuntu | lunar | * |
Libokhttp-java | Ubuntu | mantic | * |