{"id":4941,"date":"2024-07-01T13:12:00","date_gmt":"2024-07-01T16:12:00","guid":{"rendered":"https:\/\/www.blog.lineasdns.com\/critical-flaws-in-cocoapods-expose-ios-and-macos-apps-to-supply-chain-attacks\/"},"modified":"2024-07-01T13:12:00","modified_gmt":"2024-07-01T16:12:00","slug":"critical-flaws-in-cocoapods-expose-ios-and-macos-apps-to-supply-chain-attacks","status":"publish","type":"post","link":"https:\/\/www.blog.lineasdns.com\/en\/critical-flaws-in-cocoapods-expose-ios-and-macos-apps-to-supply-chain-attacks\/","title":{"rendered":"Critical Flaws in CocoaPods Expose iOS and macOS Apps to Supply Chain Attacks"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a target=\"_blank\" href=\"https:\/\/www.blog.lineasdns.com\/wp-content\/uploads\/2025\/01\/Supply-Chain-Attack.gif\" style=\"clear: left; display: block; float: left;  text-align: center;\"><\/a><\/div>\n<p>A trio of security flaws has been uncovered in the <a target=\"_blank\" href=\"https:\/\/cocoapods.org\/\" rel=\"noopener\" target=\"_blank\">CocoaPods<\/a> dependency manager for Swift and Objective-C Cocoa projects that could be exploited to stage software supply chain attacks, putting downstream customers at severe risks.<\/p>\n<p>The vulnerabilities allow &#8220;any malicious actor to claim ownership over thousands of unclaimed pods and insert malicious code into many of the most popular iOS and macOS applications,&#8221; E.V.A Information Security researchers Reef Spektor and Eran Vaknin <a target=\"_blank\" href=\"https:\/\/www.evasec.io\/blog\/eva-discovered-supply-chain-vulnerabities-in-cocoapods\" rel=\"noopener\" target=\"_blank\">said<\/a> in a report published today.<\/p>\n<p>The Israeli application security firm said the three issues have since been <a target=\"_blank\" href=\"https:\/\/blog.cocoapods.org\/CocoaPods-Trunk-RCEs-2023\/\" rel=\"noopener\" target=\"_blank\">patched<\/a> by CocoaPods as of October 2023. The project maintainers also reset all user sessions at the time in response to the disclosures.<\/p>\n<div class=\"dog_two clear\"><center class=\"cf\"><a target=\"_blank\" href=\"https:\/\/thehackernews.uk\/gartner-endpoint-protection-d-v3\" rel=\"nofollow noopener sponsored\" target=\"_blank\" title=\"Cybersecurity\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/www.blog.lineasdns.com\/wp-content\/uploads\/2025\/01\/GartnerMQ-d-v3.jpg\" width=\"727\" height=\"90\"\/><\/a><\/center><\/div>\n<p>One of the vulnerabilities is <a target=\"_blank\" href=\"https:\/\/github.com\/CocoaPods\/CocoaPods\/security\/advisories\/GHSA-j483-qm5c-7hqx\" target=\"_blank\">CVE-2024-38368<\/a> (CVSS score: 9.3), which makes it possible for an attacker to abuse the &#8220;<a target=\"_blank\" href=\"https:\/\/blog.cocoapods.org\/Claim-Your-Pods\/\" rel=\"noopener\" target=\"_blank\">Claim Your Pods<\/a>&#8221; process and take control of a package, effectively allowing them to tamper with the source code and introduce malicious changes. However, this required that all prior maintainers have been removed from the project.<\/p>\n<p>The roots of the problem go back to 2014, when a migration to the <a target=\"_blank\" href=\"https:\/\/blog.cocoapods.org\/CocoaPods-Trunk\/\" rel=\"noopener\" target=\"_blank\">Trunk server<\/a> left thousands of packages with unknown (or <a target=\"_blank\" href=\"https:\/\/cocoapods.org\/owners\/7\" rel=\"noopener\" target=\"_blank\">unclaimed<\/a>) owners, permitting an attacker to use a public API for claiming pods and an email address that was available in the CocoaPods source code (&#8220;unclaimed-pods@cocoapods.org&#8221;) to take over control.<\/p>\n<p>The second bug is even more critical (<a target=\"_blank\" href=\"https:\/\/github.com\/CocoaPods\/CocoaPods\/security\/advisories\/GHSA-x2x4-g675-qg7c\" target=\"_blank\">CVE-2024-38366<\/a>, CVSS score: 10.0) and takes advantage of an insecure email verification workflow to run arbitrary code on the Trunk server, which could then be used to manipulate or replace the packages.<\/p>\n<p><iframe loading=\"lazy\" title=\"CVE-2024-38366\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/nO84n2v3ZyM?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p>Also identified in the service is a second problem in the email address verification component (<a target=\"_blank\" href=\"https:\/\/github.com\/CocoaPods\/CocoaPods\/security\/advisories\/GHSA-52gf-m7v9-m333\" target=\"_blank\">CVE-2024-38367<\/a>, CVSS score: 8.2) that could entice a recipient into clicking on a seemingly-benign verification link, when, in reality, it reroutes the request to an attacker-controlled domain in order to gain access to a developer&#8217;s session tokens.<\/p>\n<p>Making matters worse, this can be upgraded into a zero-click account takeover attack by spoofing an HTTP header \u2013 i.e., modifying the <a target=\"_blank\" href=\"https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/HTTP\/Headers\/X-Forwarded-Host\" rel=\"noopener\" target=\"_blank\">X-Forwarded-Host<\/a> header field \u2013 and taking advantage of misconfigured email security tools.<\/p>\n<div class=\"dog_two clear\"><center class=\"cf\"><a target=\"_blank\" href=\"https:\/\/thehackernews.uk\/itdr-guide-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\" title=\"Cybersecurity\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/www.blog.lineasdns.com\/wp-content\/uploads\/2025\/01\/1735742824_221_per-d.png\" width=\"727\" height=\"90\"\/><\/a><\/center><\/div>\n<p>&#8220;We have found that almost every pod owner is registered with their organizational email on the Trunk server, which makes them vulnerable to our zero-click takeover vulnerability,&#8221; the researchers said.<\/p>\n<p>This is not the first time CocoaPods has come under the scanner. In March 2023, Checkmarx <a target=\"_blank\" href=\"https:\/\/zero.checkmarx.com\/this-is-how-i-hijacked-cocoapods-subdomain-using-github-pages-4e368e849022\" rel=\"noopener\" target=\"_blank\">revealed<\/a> that an abandoned sub-domain associated with the dependency manager (&#8220;cdn2.cocoapods[.]org&#8221;) could have been hijacked by an adversary via GitHub Pages with an aim to host their payloads.<\/p>\n<p><\/p>\n<\/div>\n<p><br \/>\n<br \/>\n<center><\/p>\n<p>________________________________________________<\/p>\n<p><\/center><\/p>\n<p>Here, we deliver the latest insights from the world of cybersecurity, featuring updates from industry leaders and our trusted partners. Stay ahead of emerging threats, cutting-edge solutions, and the opportunities defining the future of digital security. \ud83d\udee1\ufe0f\ud83c\udf10<\/p>\n<p>Thank you for trusting us as your guide. \ud83d\udd12 Together, we\u2019re building a safer digital world!<\/p>\n<p>\n<a href=\"https:\/\/thehackernews.com\/2024\/07\/critical-flaws-in-cocoapods-expose-ios.html?rand=1734\">Source Link<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"A trio of security flaws has been uncovered in the CocoaPods dependency manager for Swift and Objective-C Cocoa&hellip;","protected":false},"author":1,"featured_media":4942,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"0","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","csco_singular_sidebar":"","csco_page_header_type":"","csco_page_load_nextpost":"","footnotes":""},"categories":[68],"tags":[84,77,70,69,71,72,73,78,74,75,80,82,81,79,76,83],"class_list":{"0":"post-4941","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-hacker-news","8":"tag-computer-security","9":"tag-cyber-attacks","10":"tag-cyber-news","11":"tag-cyber-security-news","12":"tag-cyber-security-news-today","13":"tag-cyber-security-updates","14":"tag-cyber-updates","15":"tag-data-breach","16":"tag-hacker-news","17":"tag-hacking-news","18":"tag-how-to-hack","19":"tag-information-security","20":"tag-network-security","21":"tag-ransomware-malware","22":"tag-software-vulnerability","23":"tag-the-hacker-news","24":"cs-entry"},"_links":{"self":[{"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/posts\/4941","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/comments?post=4941"}],"version-history":[{"count":0,"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/posts\/4941\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/media\/4942"}],"wp:attachment":[{"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/media?parent=4941"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/categories?post=4941"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/tags?post=4941"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}