Description
Mifos-Mobile Android Application for MifosX is an Android Application built on top of the MifosX Self-Service platform. Mifos-Mobile before commit e505f62 disables HTTPS hostname verification of its HTTP client. Additionally it accepted any self-signed certificate as valid. Hostname verification is an important part when using HTTPS to ensure that the presented certificate is valid for the host. Disabling it can allow for man-in-the-middle attacks. Accepting any certificate, even self-signed ones allows man-in-the-middle attacks. This problem is fixed in mifos-mobile commit e505f62.
References
https://github.com/openMF/mifos-mobile/commit/e505f62b92b19292bfdabd6e996ab76abfeaa90d
https://github.com/openMF/mifos-mobile/security/advisories/GHSA-9657-33wf-rmvx
https://openmf.github.io/mobileapps.github.io/
https://github.com/openMF/mifos-mobile/commit/e505f62b92b19292bfdabd6e996ab76abfeaa90d
https://github.com/openMF/mifos-mobile/security/advisories/GHSA-9657-33wf-rmvx
https://openmf.github.io/mobileapps.github.io/
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.8 · High
Information
Source identifier
Vulnerability status
Modified
Published
2021-03-24T20:15:15.070Z
4 years agoLast modified
2024-11-21T04:48:14.983Z
1 year ago