OkHttp before 2.7.4 and 3.x before 3.1.2 allows man-in-the-middle attackers to bypass certificate pinning by sending a certificate chain with a certificate from a non-pinned trusted CA and the pinned certificate.
{ "nvd_published_at": "2017-01-30T22:59:00Z", "cwe_ids": [ "CWE-295" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2022-07-06T19:58:11Z" }