The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2024-38367

CVE-2024-38367: CocoaPods Trunk Auth Bypass Vulnerability

CVE-2024-38367 is an authentication bypass flaw in CocoaPods Trunk that enables session hijacking and full account takeover. This article covers the technical details, affected versions, impact, and mitigation.

Updated: January 22, 2026

CVE-2024-38367 Overview

CVE-2024-38367 is a critical session hijacking vulnerability in trunk.cocoapods.org, the authentication server for the CocoaPods dependency manager. Prior to commit d4fa66f49cedab449af9a56a21ab40697b9f7b97, the trunk sessions verification step could be manipulated to enable owner session hijacking. Compromising a victim's session results in a full takeover of the CocoaPods trunk account. A threat actor could manipulate pod specifications, disrupt the distribution of legitimate libraries, or cause widespread disruption within the CocoaPods ecosystem.

Critical Impact

Full account takeover of CocoaPods trunk accounts, enabling attackers to manipulate pod specifications and disrupt the supply chain for iOS/macOS applications.

Affected Products

  • CocoaPods trunk.cocoapods.org (versions prior to commit d4fa66f49cedab449af9a56a21ab40697b9f7b97)

Discovery Timeline

  • October 2023 - CocoaPods releases security patch (commit d4fa66f49cedab449af9a56a21ab40697b9f7b97)
  • 2024-07-01 - CVE-2024-38367 published to NVD
  • 2024-11-21 - Last updated in NVD database

Technical Details for CVE-2024-38367

Vulnerability Analysis

This vulnerability falls under the category of Session Hijacking (CWE-488: Exposure of Data Element to Wrong Session). The flaw exists in the session verification mechanism of CocoaPods trunk, which is the central authentication server managing package ownership and publishing rights for the CocoaPods ecosystem.

The vulnerability allowed an attacker to manipulate the session verification URL, potentially hijacking owner sessions without any user interaction beyond the victim clicking a verification link. This zero-click account takeover attack defeats email security boundaries by exploiting improper URL construction in the session verification flow.

Given CocoaPods' position as the primary dependency manager for iOS and macOS development, with millions of applications depending on it, this vulnerability posed a significant supply chain risk. An attacker with control over a pod owner's account could push malicious code updates to widely-used libraries.

Root Cause

The root cause lies in how the verification URL was dynamically constructed using request headers (request.scheme and request.host_with_port). This allowed an attacker to control the verification URL by manipulating these request headers, directing the verification link to an attacker-controlled domain and capturing the session token.

Attack Vector

The attack vector is network-based and requires some user interaction (the victim clicking a verification link). An attacker could:

  1. Initiate a session creation request with manipulated host headers
  2. Cause the verification URL to point to an attacker-controlled domain
  3. When the victim clicks the malicious verification link, their session token is sent to the attacker
  4. The attacker uses the captured token for full account takeover
ruby
             o.save
           end
 
-          url_template = "#{request.scheme}://#{request.host_with_port}/sessions/verify/%s"
+          url_template = ENV['RACK_ENV'] == 'test' ? "#{request.scheme}://#{request.host_with_port}/sessions/verify/%s" : 'https://trunk.cocoapods.org/sessions/verify/%s'
           session = owner.create_session!(request.ip, url_template, session_description)
           session_attributes = session.public_attributes
           session_attributes['token'] = session.token

Source: CocoaPods Commit Details

Detection Methods for CVE-2024-38367

Indicators of Compromise

  • Unexpected session verification emails with non-standard URLs (domains other than trunk.cocoapods.org)
  • Unauthorized changes to pod specifications or ownership
  • Login notifications from unfamiliar IP addresses or geographic locations
  • Unexpected new maintainers added to pods

Detection Strategies

  • Monitor CocoaPods trunk account activity for unauthorized modifications to pod specifications
  • Review email logs for session verification requests with suspicious or non-standard domains
  • Audit pod ownership changes and new maintainer additions
  • Implement alerting for any account activity originating from unexpected IP addresses

Monitoring Recommendations

  • Enable notifications for all account activity on CocoaPods trunk accounts
  • Monitor deployed applications for unexpected dependency updates from your managed pods
  • Review CocoaPods trunk session logs for anomalous patterns
  • Implement integrity monitoring for critical pod specifications

How to Mitigate CVE-2024-38367

Immediate Actions Required

  • Verify that your CocoaPods trunk server is updated past commit d4fa66f49cedab449af9a56a21ab40697b9f7b97
  • Review all pod specifications for unauthorized changes
  • Regenerate API tokens and session credentials for all trunk accounts
  • Audit pod ownership and remove any unauthorized maintainers

Patch Information

This vulnerability was patched server-side by CocoaPods in October 2023 with commit d4fa66f49cedab449af9a56a21ab40697b9f7b97. The fix hardcodes the production trunk URL (https://trunk.cocoapods.org/sessions/verify/%s) instead of dynamically constructing it from request headers. For additional details, see the CocoaPods Blog Post and the GitHub Security Advisory GHSA-52gf-m7v9-m333.

Workarounds

  • Carefully inspect all session verification emails before clicking links, ensuring they point to trunk.cocoapods.org
  • Use email security solutions that can detect and block emails with suspicious verification URLs
  • Implement additional authentication factors for critical pod management operations
  • Consider signing pod releases with GPG keys for additional verification
bash
# Verify your CocoaPods trunk session status
pod trunk me

# Review registered sessions and revoke suspicious ones
pod trunk info [POD_NAME]

# Check for any unauthorized changes to your pod
pod trunk owners [POD_NAME]

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechCocoapods

  • SeverityCRITICAL

  • CVSS Score9.6

  • EPSS Probability4.99%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityHigh
  • AvailabilityHigh
  • CWE References
  • CWE-488

  • NVD-CWE-Other
  • Technical References
  • EvaSec Supply Chain Vulnerabilities

  • GitHub Security Advisory GHSA-52gf-m7v9-m333
  • Vendor Resources
  • CocoaPods RCEs Analysis

  • CocoaPods Commit Details
  • Related CVEs
  • CVE-2024-38368: CocoaPods Trunk Auth Bypass Vulnerability

  • CVE-2024-38366: CocoaPods Trunk RCE Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English