Vulnerability Description
The Twitter Kit framework through 3.4.2 for iOS does not properly validate the api.twitter.com SSL certificate. Although the certificate chain must contain one of a set of pinned certificates, there are certain implementation errors such as a lack of hostname verification. NOTE: this is an end-of-life product.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Twitter Kit | <= 3.4.2 |
Related Weaknesses (CWE)
References
- https://blog.appicaptor.com/2019/10/04/vulnerable-library-warning-twitterkit-forThird Party Advisory
- https://github.com/twitter-archive/twitter-kit-ios/blob/ac42e1351a66afa5ff7718d0Third Party Advisory
- https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_TwitterKit_for_iOExploitThird Party Advisory
- https://blog.appicaptor.com/2019/10/04/vulnerable-library-warning-twitterkit-forThird Party Advisory
- https://github.com/twitter-archive/twitter-kit-ios/blob/ac42e1351a66afa5ff7718d0Third Party Advisory
- https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_TwitterKit_for_iOExploitThird Party Advisory
FAQ
What is CVE-2019-16263?
CVE-2019-16263 is a vulnerability with a CVSS score of 7.4 (HIGH). The Twitter Kit framework through 3.4.2 for iOS does not properly validate the api.twitter.com SSL certificate. Although the certificate chain must contain one of a set of pinned certificates, there a...
How severe is CVE-2019-16263?
CVE-2019-16263 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-16263?
Check the references section above for vendor advisories and patch information. Affected products include: Twitter Twitter Kit.