CVE-2018-20200

Source
https://cve.org/CVERecord?id=CVE-2018-20200
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-20200.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-20200
Downstream
Published
2019-04-18T19:29:01.347Z
Modified
2026-03-15T22:26:00.356848Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

CertificatePinner.java in OkHttp 3.x through 3.12.0 allows man-in-the-middle attackers to bypass certificate pinning by changing SSLContext and the boolean values while hooking the application. NOTE: This id is disputed because some parties don't consider this is a vulnerability. Their rationale can be found in https://github.com/square/okhttp/issues/4967

References

Affected packages

Git / github.com/square/okhttp

Affected ranges

Type
GIT
Repo
https://github.com/square/okhttp
Events
Database specific
{
    "versions": [
        {
            "introduced": "3.0.0"
        },
        {
            "last_affected": "3.12.0"
        }
    ]
}

Affected versions

Other
list
parent-3.*
parent-3.0.0
parent-3.0.1
parent-3.1.0
parent-3.1.1
parent-3.1.2
parent-3.10.0
parent-3.11.0
parent-3.12.0
parent-3.2.0
parent-3.3.0
parent-3.3.1
parent-3.4.0
parent-3.4.0-RC1
parent-3.5.0
parent-3.6.0
parent-3.7.0
parent-3.8.0
parent-3.9.0
parent-3.9.1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-20200.json"