Apache Cordova-Android before 4.1.0, when an application relies on a remote server, improperly implements a JavaScript whitelist protection mechanism, which allows attackers to bypass intended access restrictions via a crafted URI.
References
Configurations
History
21 Nov 2024, 02:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://jvn.jp/en/jp/JVN18889193/index.html - | |
References | () http://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000187.html - | |
References | () http://packetstormsecurity.com/files/134497/Apache-Cordova-3.7.2-Whitelist-Failure.html - | |
References | () http://www.securityfocus.com/archive/1/536944/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/77677 - | |
References | () https://cordova.apache.org/announcements/2015/11/20/security.html - Vendor Advisory |
Information
Published : 2015-11-23 11:59
Updated : 2024-11-21 02:32
NVD link : CVE-2015-5256
Mitre link : CVE-2015-5256
CVE.ORG link : CVE-2015-5256
JSON object : View
Products Affected
apache
- cordova
CWE
CWE-264
Permissions, Privileges, and Access Controls