Attackers can potentially snoop on the encrypted traffic of over 25,000 iOS applications due to a vulnerability in a popular open-source networking library.
The vulnerability stems from a failure to validate the domain names of digital certificates in AFNetworking, a library used by a large number of iOS and Mac OS X app developers to implement Web communications—including those over HTTPS (HTTP with SSL/TLS encryption).
The flaw allows attackers in a position to intercept HTTPS traffic between a vulnerable application and a Web service to decrypt it by presenting the application with a digital certificate for a different domain name. Such man-in-the-middle attacks can be launched over insecure wireless networks, by hacking into routers or through other methods.
According to a company called SourceDNA, which tracks the use of third-party components in mobile apps, more than 25,000 iOS applications are potentially vulnerable because they use AFNetworking 2.5.2 or older versions.
The vulnerability was fixed in AFNetworking 2.5.3, released on April 20.
Applications that have certificate pinning turned on are not vulnerable, but this mechanism is only used by a small number of developers, SourceDNA said Friday in a blog post.
One interesting aspect of this flaw is that it was reported to the AFNetworking developers on March 27, one day after a different flaw that allowed HTTPS snooping was addressed in AFNetworking 2.5.2.
Read the Full Article: Source – PC World