Home MOBILE CocoaPods: Vulnerable to supply chain attacks in “countless” Mac and iOS apps

CocoaPods: Vulnerable to supply chain attacks in “countless” Mac and iOS apps

0


It is said that serious problems exist in the popular dependency management tool CocoaPods, which has been used in millions of apps for iPhone, Mac and Co. for almost nine years. This is what IT researchers from security provider Eva Security said in a report New paperwhich was released on Monday. According to the information, it was at least theoretically possible for attackers to take over the libraries (called “pods” in the Cocoapods language) at will and use them to install malware. In this way, attacks on the intensive supply chain would have been possible.

Advertisement


Cocoapods is a Open source project that brings together more than 100,000 libraries and, according to the creators, in “more than 3 million apps”.. The tool is advertised as, “CocoaPods helps you scale your project gracefully.” The Ruby-based dependency manager is intended for Swift and Objective-C projects. Eva Security found that CocoaPods moved all pods to a new “trunk server” on GitHub in 2014. The authors of each library were simply reset. CocoaPods then asked developers to “claim” their respective libraries.

However, not everyone did so. Amazing 1870 pods Currently there is still the owner name “?”, so they are completely without it. With the acquisition, it became possible to inject code into a Swift or Objective-C project that uses one of these libraries. The incident is held by EVA Security under CVE ID 2024-38368 Submitted and had a CVSS score of 9.3. (The worst vulnerabilities reach a score of 10.)

macOS 15: Apple is implementing the long-standing desire for shortcuts for the context menu

The attack was very easy to implement: to take over a pod, the attacker only had to make a curl request. The library can then be crafted with malware or other code at will, which then ends up in apps using the library via Cocoapods. The use of Cocoapods affects not only small developers, but also big names such as Amazon, Microsoft, TikTok, Meta or even Apple, according to Eva Security. It is currently impossible to say whether attacks on the supply chain have actually occurred via this route. However, it is conceivable. Eva Security discovered the problem not through analysis of Cocoapods themselves, but during red teaming experiments with a customer.

In addition to the supply chain attack, security researchers discovered two other issues in the CocoaPods trunk server itself Executing deleted code A vulnerable Ruby package and about it Stealing session cookies Regarding the bug discovered in the source code. Affected developers should first check which packages they are using and then manually validate the third-party libraries used. If one of the 1870 pods is found without an owner, the library should be removed immediately. The intention is to minimize the lag in the trunk server as well as the easy possibility of taking over the pods From the Cocoapods project It was discontinued in October 2023 itself.


(B.Sc.)

Best monthly cancelable tariff in July 2024: 30 GB Vodafone for 17 euros

NO COMMENTS

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Exit mobile version