CNVD-2018-05757

Vulnerability from cnvd - Published: 2018-03-20
VLAI Severity ?
Title
Twitter Kit for iOS Login with Twitter组件存在未明漏洞
Description
Twitter Kit for iOS是一套基于iOS平台的开源的用于与Twitter进行无缝交互的本地开发工具包。Login with Twitter component是其中的一个登陆组件。 基于iOS平台的Twitter Kit 3.0版本至3.2.1版本中的Login with Twitter组件存在安全漏洞。攻击者可利用该漏洞提交代替性的凭证,使推特账户与第三方服务发生关联。
Severity
Patch Name
Twitter Kit for iOS Login with Twitter组件存在未明漏洞的补丁
Patch Description
Twitter Kit for iOS是一套基于iOS平台的开源的用于与Twitter进行无缝交互的本地开发工具包。Login with Twitter component是其中的一个登陆组件。 基于iOS平台的Twitter Kit 3.0版本至3.2.1版本中的Login with Twitter组件存在安全漏洞。攻击者可利用该漏洞提交代替性的凭证,使推特账户与第三方服务发生关联。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://blog.twitter.com/developer/en_us/topics/tips/2018/vulnerability-in-twitter-kit-for-ios.html

Reference
https://blog.twitter.com/developer/en_us/topics/tips/2018/vulnerability-in-twitter-kit-for-ios.html
Impacted products
Name
Twitter Kit for iOS >=3.0,<=3.2.1
Show details on source website

{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2017-0911"
    }
  },
  "description": "Twitter Kit for iOS\u662f\u4e00\u5957\u57fa\u4e8eiOS\u5e73\u53f0\u7684\u5f00\u6e90\u7684\u7528\u4e8e\u4e0eTwitter\u8fdb\u884c\u65e0\u7f1d\u4ea4\u4e92\u7684\u672c\u5730\u5f00\u53d1\u5de5\u5177\u5305\u3002Login with Twitter component\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u767b\u9646\u7ec4\u4ef6\u3002\r\n\r\n\u57fa\u4e8eiOS\u5e73\u53f0\u7684Twitter Kit 3.0\u7248\u672c\u81f33.2.1\u7248\u672c\u4e2d\u7684Login with Twitter\u7ec4\u4ef6\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u63d0\u4ea4\u4ee3\u66ff\u6027\u7684\u51ed\u8bc1\uff0c\u4f7f\u63a8\u7279\u8d26\u6237\u4e0e\u7b2c\u4e09\u65b9\u670d\u52a1\u53d1\u751f\u5173\u8054\u3002",
  "discovererName": "unknow",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://blog.twitter.com/developer/en_us/topics/tips/2018/vulnerability-in-twitter-kit-for-ios.html",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2018-05757",
  "openTime": "2018-03-20",
  "patchDescription": "Twitter Kit for iOS\u662f\u4e00\u5957\u57fa\u4e8eiOS\u5e73\u53f0\u7684\u5f00\u6e90\u7684\u7528\u4e8e\u4e0eTwitter\u8fdb\u884c\u65e0\u7f1d\u4ea4\u4e92\u7684\u672c\u5730\u5f00\u53d1\u5de5\u5177\u5305\u3002Login with Twitter component\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u767b\u9646\u7ec4\u4ef6\u3002\r\n\r\n\u57fa\u4e8eiOS\u5e73\u53f0\u7684Twitter Kit 3.0\u7248\u672c\u81f33.2.1\u7248\u672c\u4e2d\u7684Login with Twitter\u7ec4\u4ef6\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u63d0\u4ea4\u4ee3\u66ff\u6027\u7684\u51ed\u8bc1\uff0c\u4f7f\u63a8\u7279\u8d26\u6237\u4e0e\u7b2c\u4e09\u65b9\u670d\u52a1\u53d1\u751f\u5173\u8054\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Twitter Kit for iOS Login with Twitter\u7ec4\u4ef6\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": "Twitter Kit for iOS \u003e=3.0\uff0c\u003c=3.2.1"
  },
  "referenceLink": "https://blog.twitter.com/developer/en_us/topics/tips/2018/vulnerability-in-twitter-kit-for-ios.html",
  "serverity": "\u4e2d",
  "submitTime": "2018-02-26",
  "title": "Twitter Kit for iOS Login with Twitter\u7ec4\u4ef6\u5b58\u5728\u672a\u660e\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…