This affects the package MintegralAdSDK from 0.0.0. The SDK distributed by the company contains malicious functionality that tracks any URL opened by the app and reports it back to the company, along with performing advertisement attribution fraud. Mintegral can remotely activate hooks on the UIApplication, openURL, SKStoreProductViewController, loadProductWithParameters and NSURLProtocol methods along with anti-debug and proxy detection protection. If those hooks are active MintegralAdSDK sends obfuscated data about every opened URL in an application to their servers. Note that the malicious functionality is enabled even if the SDK was not enabled to serve ads.
References
Link | Resource |
---|---|
https://snyk.io/blog/sourmint-malicious-code-ad-fraud-and-data-leak-in-ios/ | Third Party Advisory |
https://snyk.io/research/sour-mint-malicious-sdk/ | Third Party Advisory |
https://snyk.io/vuln/SNYK-COCOAPODS-MINTEGRALADSDK-598852 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: snyk
Published: 2020-08-24T00:00:00
Updated: 2020-08-24T17:15:15
Reserved: 2020-01-21T00:00:00
Link: CVE-2020-7705
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-08-24T18:15:10.143
Modified: 2020-09-02T14:53:50.817
Link: CVE-2020-7705
JSON object: View
Redhat Information
No data.
CWE