Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-20200

Опубликовано: 19 апр. 2019
Источник: redhat
CVSS3: 5.9

Описание

CertificatePinner.java in OkHttp 3.x through 3.12.0 allows man-in-the-middle attackers to bypass certificate pinning by changing SSLContext and the boolean values while hooking the application. NOTE: This id is disputed because some parties don't consider this is a vulnerability. Their rationale can be found in https://github.com/square/okhttp/issues/4967

Отчет

OkHttp is used by OpenShift Container Platform in the Aggregated Logging stack. This issue is not considered a vulnerability for OpenShift Container Platform as the prerequisite for exploitation is the ability to inject code into the application.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Decision Manager 7okhttpNot affected
Red Hat Fuse 7okhttpNot affected
Red Hat OpenShift Application RuntimesokhttpNot affected
Red Hat OpenShift Container Platform 3.10elasticsearch-cloud-kubernetesNot affected
Red Hat OpenShift Container Platform 3.10openshift-elasticsearch-pluginNot affected
Red Hat OpenShift Container Platform 3.11openshift3/ose-logging-elasticsearch5Not affected
Red Hat OpenShift Container Platform 3.9elasticsearch-cloud-kubernetesNot affected
Red Hat OpenShift Container Platform 3.9openshift-elasticsearch-pluginNot affected
Red Hat OpenShift Container Platform 4openshift4/ose-logging-elasticsearch5Not affected
Red Hat Process Automation 7okhttpNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-300
https://bugzilla.redhat.com/show_bug.cgi?id=1709379okhttp: certificate pinning bypass

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
ubuntu
почти 7 лет назад

CertificatePinner.java in OkHttp 3.x through 3.12.0 allows man-in-the-middle attackers to bypass certificate pinning by changing SSLContext and the boolean values while hooking the application. NOTE: This id is disputed because some parties don't consider this is a vulnerability. Their rationale can be found in https://github.com/square/okhttp/issues/4967

CVSS3: 5.9
nvd
почти 7 лет назад

CertificatePinner.java in OkHttp 3.x through 3.12.0 allows man-in-the-middle attackers to bypass certificate pinning by changing SSLContext and the boolean values while hooking the application. NOTE: This id is disputed because some parties don't consider this is a vulnerability. Their rationale can be found in https://github.com/square/okhttp/issues/4967

CVSS3: 5.9
debian
почти 7 лет назад

CertificatePinner.java in OkHttp 3.x through 3.12.0 allows man-in-the- ...

CVSS3: 5.9
github
больше 3 лет назад

CertificatePinner.java in OkHttp 3.x through 3.12.0 allows man-in-the-middle attackers to bypass certificate pinning by changing SSLContext and the boolean values while hooking the application.

5.9 Medium

CVSS3