Apache Cordova-Android before 4.1.0, when an application relies on a remote server, improperly implements a JavaScript whitelist protection mechanism, which allows attackers to bypass intended access restrictions via a crafted URI.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/536944/100/0/threaded | mailing list |
http://packetstormsecurity.com/files/134497/Apache-Cordova-3.7.2-Whitelist-Failure.html | |
http://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000187.html | third party advisory |
http://www.securityfocus.com/bid/77677 | vdb entry |
https://cordova.apache.org/announcements/2015/11/20/security.html | vendor advisory |
http://jvn.jp/en/jp/JVN18889193/index.html | third party advisory |