OkHttp before 2.7.4 and 3.x before 3.1.2 allows man-in-the-middle attackers to bypass certificate pinning by sending a certificate chain with a certificate from a non-pinned trusted CA and the pinned certificate.
{
"github_reviewed": true,
"severity": "MODERATE",
"nvd_published_at": "2017-01-30T22:59:00Z",
"github_reviewed_at": "2022-07-06T19:58:11Z",
"cwe_ids": [
"CWE-295"
]
}