CertificatePinner.java in OkHttp 3.x through 3.12.0 allows man-in-the-middle attackers to bypass certificate pinning by changing SSLContext and the boolean values while hooking the application. NOTE: This id is disputed because some parties don't consider this is a vulnerability. Their rationale can be found in https://github.com/square/okhttp/issues/4967
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T11:58:19.134Z
Reserved: 2018-12-18T00:00:00
Link: CVE-2018-20200

No data.

Status : Modified
Published: 2019-04-18T19:29:01.347
Modified: 2024-11-21T04:01:05.203
Link: CVE-2018-20200
