[GH-ISSUE #228] Unsafe HTTPS use #165

Closed
opened 2026-02-28 01:23:29 +03:00 by kerem · 3 comments
Owner

Originally created by @wolfmd on GitHub (Dec 10, 2014).
Original GitHub issue: https://github.com/ushahidi/SMSSync/issues/228

This may be due to the results of other issues, but running a security scan against the source code of this project has shown that the HTTPS used in this application has been manually overiden. Using HTTPS increases the security of credentials transmitted between the device and server as well as guaranteeing there is no middle-man attacker feeding malicious data to the user.

It seems some of these are user-overrides of validation, however, EasySSLSocketFactory should not be used as a default.

ushahidiSMSSync/smssync/src/main/java/org/addhen/smssync/net/EasySSLSocketFactory.java:63: SSLSocket created without proper hostname verification
ushahidiSMSSync/smssync/src/main/java/org/addhen/smssync/net/TrustedSocketFactory.java:52: Custom HostnameVerifier used; this is not safe for production use
ushahidiSMSSync/smssync/src/main/java/org/addhen/smssync/net/TrustedSocketFactory.java:53: AllowAllHostnameVerifier used, this is not a secure connection
ushahidiSMSSync/smssync/src/main/java/org/addhen/smssync/net/TrustedSocketFactory.java:76: SSLSocket created without proper hostname verification

Originally created by @wolfmd on GitHub (Dec 10, 2014). Original GitHub issue: https://github.com/ushahidi/SMSSync/issues/228 This may be due to the results of other issues, but running a security scan against the source code of this project has shown that the HTTPS used in this application has been manually overiden. Using HTTPS increases the security of credentials transmitted between the device and server as well as guaranteeing there is no middle-man attacker feeding malicious data to the user. It seems some of these are user-overrides of validation, however, EasySSLSocketFactory should not be used as a default. ushahidiSMSSync/smssync/src/main/java/org/addhen/smssync/net/EasySSLSocketFactory.java:63: SSLSocket created without proper hostname verification ushahidiSMSSync/smssync/src/main/java/org/addhen/smssync/net/TrustedSocketFactory.java:52: Custom HostnameVerifier used; this is not safe for production use ushahidiSMSSync/smssync/src/main/java/org/addhen/smssync/net/TrustedSocketFactory.java:53: AllowAllHostnameVerifier used, this is not a secure connection ushahidiSMSSync/smssync/src/main/java/org/addhen/smssync/net/TrustedSocketFactory.java:76: SSLSocket created without proper hostname verification
kerem closed this issue 2026-02-28 01:23:30 +03:00
Author
Owner

@alxndrsn commented on GitHub (Apr 6, 2016):

Is this still an issue? It doesn't look like any of the referenced classes still exist in the project, and HTTPS connections are now handled by third party libs.

<!-- gh-comment-id:206382601 --> @alxndrsn commented on GitHub (Apr 6, 2016): Is this still an issue? It doesn't look like any of the referenced classes still exist in the project, and HTTPS connections are now handled by third party libs.
Author
Owner

@timmwille commented on GitHub (Jan 29, 2021):

can be closed?

<!-- gh-comment-id:769495394 --> @timmwille commented on GitHub (Jan 29, 2021): can be closed?
Author
Owner

@wolfmd commented on GitHub (Jan 29, 2021):

Yeah, for sure. Cheers!

<!-- gh-comment-id:769522820 --> @wolfmd commented on GitHub (Jan 29, 2021): Yeah, for sure. Cheers!
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/SMSSync#165
No description provided.