You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Older versions of Sparkle have a rather serious security vulnerability in it that allows a man in the middle attack to remote execute code during an update check.
All Sparkle versions older than 1.13.1 which fetch appcast or release notes over insecure HTTP connection are vulnerable to a man-in-the-middle attack that can lead to disclosure of local files or remote code execution.
Applications using Sparkle with HTTPS appcast feed URLs and HTTPS release notes links (if any) are safe.
Only update URLs not using HTTPS are affected. I haven't tested the vulnerability with Amethyst but it looks like the app is using 1.9.0 so it would be affected by this issue (unless it's using HTTPS for updates).
The text was updated successfully, but these errors were encountered:
Older versions of Sparkle have a rather serious security vulnerability in it that allows a man in the middle attack to remote execute code during an update check.
More details at:
Only update URLs not using HTTPS are affected. I haven't tested the vulnerability with Amethyst but it looks like the app is using 1.9.0 so it would be affected by this issue (unless it's using HTTPS for updates).
The text was updated successfully, but these errors were encountered: