DEBIAN-CVE-2018-20200

Source
https://security-tracker.debian.org/tracker/CVE-2018-20200
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2018-20200.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2018-20200
Upstream
Published
2019-04-18T19:29:01Z
Modified
2025-09-25T07:50:11.294576Z
Summary
[none]
Details

CertificatePinner.java in OkHttp 3.x through 3.12.0 allows man-in-the-middle attackers to bypass certificate pinning by changing SSLContext and the boolean values while hooking the application. NOTE: This id is disputed because some parties don't consider this is a vulnerability. Their rationale can be found in https://github.com/square/okhttp/issues/4967

References

Affected packages

Debian:11 / libokhttp-java

Package

Name
libokhttp-java
Purl
pkg:deb/debian/libokhttp-java?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.13.1-2
3.13.1-3~bpo11+1
3.13.1-3
3.13.1-4

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:12 / libokhttp-java

Package

Name
libokhttp-java
Purl
pkg:deb/debian/libokhttp-java?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.13.1-3
3.13.1-4

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:13 / libokhttp-java

Package

Name
libokhttp-java
Purl
pkg:deb/debian/libokhttp-java?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.13.1-4

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:14 / libokhttp-java

Package

Name
libokhttp-java
Purl
pkg:deb/debian/libokhttp-java?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.13.1-4

Ecosystem specific

{
    "urgency": "unimportant"
}