trunk.cocoapods.org is the authentication server for the CoacoaPods dependency manager. Prior to commit d4fa66f49cedab449af9a56a21ab40697b9f7b97, the trunk sessions verification step could be manipulated for owner session hijacking Compromising a victim’s session will result in a full takeover of the CocoaPods trunk account. The threat actor could manipulate their pod specifications, disrupt the distribution of legitimate libraries, or cause widespread disruption within the CocoaPods ecosystem. This was patched server-side with commit d4fa66f49cedab449af9a56a21ab40697b9f7b97 in October 2023.
Metrics
Affected Vendors & Products
References
History
Wed, 18 Sep 2024 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cocoapods
Cocoapods trunk.cocoapods.org |
|
Weaknesses | NVD-CWE-Other | |
CPEs | cpe:2.3:a:cocoapods:trunk.cocoapods.org:*:*:*:*:ruby:*:*:* | |
Vendors & Products |
Cocoapods
Cocoapods trunk.cocoapods.org |

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-19T14:50:18.770Z
Reserved: 2024-06-14T14:16:16.466Z
Link: CVE-2024-38367

Updated: 2024-08-02T04:04:25.266Z

Status : Modified
Published: 2024-07-01T21:15:04.020
Modified: 2024-11-21T09:25:28.503
Link: CVE-2024-38367

No data.