Mifos-Mobile Android Application for MifosX is an Android Application built on top of the MifosX Self-Service platform. Mifos-Mobile before commit e505f62 disables HTTPS hostname verification of its HTTP client. Additionally it accepted any self-signed certificate as valid. Hostname verification is an important part when using HTTPS to ensure that the presented certificate is valid for the host. Disabling it can allow for man-in-the-middle attacks. Accepting any certificate, even self-signed ones allows man-in-the-middle attacks. This problem is fixed in mifos-mobile commit e505f62.
References
Link | Resource |
---|---|
https://github.com/openMF/mifos-mobile/commit/e505f62b92b19292bfdabd6e996ab76abfeaa90d | Patch Third Party Advisory |
https://github.com/openMF/mifos-mobile/security/advisories/GHSA-9657-33wf-rmvx | Patch Third Party Advisory |
https://openmf.github.io/mobileapps.github.io/ | Product Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-03-24 21:15
Updated : 2024-02-04 21:23
NVD link : CVE-2021-21385
Mitre link : CVE-2021-21385
CVE.ORG link : CVE-2021-21385
JSON object : View
Products Affected
mifos
- mifos-mobile