Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use of Unsafe Serialization API #273

Open
asegurola opened this issue Apr 1, 2024 · 1 comment
Open

Use of Unsafe Serialization API #273

asegurola opened this issue Apr 1, 2024 · 1 comment

Comments

@asegurola
Copy link

Report

SDK Version

6.12.2

Please provide any other relevant information.

One static code analysis tool we use for our iOS app is throwing a warning related to the AppsFlyer SDK features.
The title of the warning is "Use of Unsafe Serialization API Exposes App to Remote Code Execution"

The evidence provided by the tool that points to appsflyer is:

{
  "type": "data",
  "method": "+[NSKeyedUnarchiver unarchiveObjectWithData:]",
  "object": "{     \"af_message\" = \"organic install\";     \"af_status\" = Organic;     \"install_time\" = \"2024-03-25 12:10:39.520\";     \"is_first_launch\" = 0; }",
  "filename": "",
  ":hashcode": "qdk8Af4vg+pcIaNWhuiZjw==",
  "metadata": {
    "evidenceKey": [
      "qdk8Af4vg+pcIaNWhuiZjw=="
    ]
  }
}

It basically says to avoid using the deprecated unarchiveObjectWithData and unarchiveObjectWithFile methods and to refer to https://developer.apple.com/documentation/foundation/nssecurecoding?language=objc for details on the proper way to do it.

@jinaiyuanbaojie
Copy link

same issue here. kindly support us

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants