Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

MITM attack possible because of 'AllowUnknownCertificateAuthority' flag #267

Open
mkcn opened this issue Oct 22, 2019 · 0 comments
Open

Comments

@mkcn
Copy link

mkcn commented Oct 22, 2019

Hello,

I would like to report a security issue found during an investigation for an iOS application which uses this library. Using the Burp tool I was able to conduct a MITM attack and intercept all traffic of the iOS application.

We found out this library allows any root CA (in this case, the root CA of Burp, which was NOT trusted on the iOS device) if the DidReceiveChallenge method is used, because of the following flag:

X509VerificationFlags.AllowUnknownCertificateAuthority;

iOS vulnerable line:

chain.ChainPolicy.VerificationFlags = X509VerificationFlags.AllowUnknownCertificateAuthority;

Android vulnerable line (this has not been tested):

chain.ChainPolicy.VerificationFlags = X509VerificationFlags.AllowUnknownCertificateAuthority;

Important note: as far as I am aware, the library has been modified in the tested iOS app, therefore there is a chance the vulnerability is not exploitable in the repo version. But i would like to have your option about it and understand why this flag was enabled in the first place.

PS: I am well aware this project is not currently active but, if this issue is confirmed, a lot of projects may be affected and therefore vulnerable to MITM attacks.

Let me know if you need any further information.

Best,
Mirko

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant