Lucene search

K
owncloudOwnCloudOC-SA-2015-012
HistoryAug 03, 2015 - 2:56 p.m.

Mobile App: Improper validation of certificates within the iOS application

2015-08-0314:56:11
owncloud.org
23

EPSS

0.001

Percentile

41.5%

The ownCloud iOS Library was vulnerable against a remotely exploitable certification problem until version 1.1.2. The vulnerable library version is used by the official ownCloud iOS client until version 3.4.4.

Specifically it has been discovered that the used networking library (AFNetworking) is per default not ensuring whether the host-specific data (i.e. the Common Name (“CN”) of the certificate) is actually associated with the connected remote host.

This effectively allows MITM (Man-in-the-Middle) attacks, allowing adversaries in such a position to intercept the traffic of the application using the ownCloud iOS Library.

ownCloud highly advises users to update affected clients as soon as possible to ensure data integrity and confidentiality. Third-party developers using the ownCloud iOS Library are encouraged to update the library and provide users with updated client versions.


For more information please consult the official advisory.

This advisory is licensed CC BY-SA 4.0

EPSS

0.001

Percentile

41.5%