-
-
Notifications
You must be signed in to change notification settings - Fork 442
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Google Play blocker; Vulnerable class define unsafe HostnameVerifier #840
Comments
hey @ClaudiaJ thanks for raising this. it's an opt-in feature as it needs We don't call Could you link me where it says that |
Hi thanks for the quick response! The content below the horizontal rule I've copied straight from the report back from our security audit tooling, with the sample code replaced with a link to the location I was able to find in which I'm suspecting the audit tooling only identifies the fact code exists overriding behavior on Thanks for pointing out the difference in I did another Search here in GitHub and found this related PR #786 from October, closed as having been unnecessary change and that this snippet was identified may be the result of improper audit. |
@ClaudiaJ yep, I guess we are fine, but let's keep this open and please, let us know when your security team replies, so we'd be sure if we'd need to do anything or not. I'd also invite you to try our new Android SDK, v2 and GA since February which lies in this repo https://github.com/getsentry/sentry-android Thanks :) |
Hi @marandaneto I got word from Security, this is now considered a non-issue for us with the evidence identified in this Issue :) Thanks again for your patience! |
@ClaudiaJ thanks for this. I'll close this then :) |
Hi, im on a react native project, facing similar issue, in our project could not locate any phrases matching HostnameVerifier, yet we still got rejected due to it. May i know is android bridge of sentry fixed this issue? version in used: "@sentry/react-native": "^1.3.3", |
Hi on the other app we're working on was with sentry v2.1.0, but it seem like we still having the hostname verifier issue on google |
@jacky-ew which |
Hi @marandaneto , after dropping google a ticket it appears that we are having hostnameverifier on other library instead of sentry, thanks for assisting. Sorry for the false alarm |
Our security team identified the following vulnerability as a Google Play blocker, the source of which traced to our usage of Sentry SDK
The vulnerable classes define a custom
HostnameVerifier
that does not perform any validation of the server's hostname:sentry-java/sentry/src/main/java/io/sentry/connection/HttpConnection.java
Lines 50 to 58 in cc4b373
Hence, connections using this
HostnameVerifier
will accept any certificate signed by a valid Certificate Authority for any hostname as valid, allowing an attacker to use a CA-signed certificate issued for a domain they own to perform a man-in-the-middle attack against the App.Regardless of whether the affected classes are actually used at runtime or not, Google Play is blocking any App that defines such an insecure
HostnameVerifier
, as detailed on Google's support page:The text was updated successfully, but these errors were encountered: