The CDVInAppBrowser class in the Apache Cordova In-App-Browser standalone plugin (org.apache.cordova.inappbrowser) before 0.3.2 for iOS and the In-App-Browser plugin for iOS from Cordova 2.6.0 through 2.9.0 does not properly validate callback identifiers, which allows remote attackers to execute arbitrary JavaScript in the host page and consequently gain privileges via a crafted gap-iab: URI.
References
Link | Resource |
---|---|
http://d3adend.org/blog/?p=403 | Issue Tracking Third Party Advisory |
http://seclists.org/fulldisclosure/2014/Mar/30 | Mailing List Third Party Advisory |
http://www.securityfocus.com/archive/1/531334/100/0/threaded | |
http://www.securityfocus.com/bid/65959 | Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/91560 | Issue Tracking Third Party Advisory VDB Entry |
https://github.com/apache/cordova-plugin-inappbrowser/commit/26702cb0720c5c394b407c23570136c53171fa55 | Issue Tracking Patch Vendor Advisory |
https://mail-archives.apache.org/mod_mbox/cordova-dev/201403.mbox/%3CCAK_TSXLGJag5Q9ATUCbFtkWvMWX9XnC80kKp-HKi25gPcvV4gw%40mail.gmail.com%3E |
Configurations
History
07 Nov 2023, 02:18
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2017-10-30 19:29
Updated : 2024-02-28 16:04
NVD link : CVE-2014-0073
Mitre link : CVE-2014-0073
CVE.ORG link : CVE-2014-0073
JSON object : View
Products Affected
apache
- cordova
- cordova_in-app-browser
CWE
CWE-264
Permissions, Privileges, and Access Controls