CVE-2015-5256

Apache Cordova-Android before 4.1.0, when an application relies on a remote server, improperly implements a JavaScript whitelist protection mechanism, which allows attackers to bypass intended access restrictions via a crafted URI.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:cordova:*:*:*:*:*:android:*:*

History

21 Nov 2024, 02:32

Type Values Removed Values Added
References () http://jvn.jp/en/jp/JVN18889193/index.html - () http://jvn.jp/en/jp/JVN18889193/index.html -
References () http://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000187.html - () http://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000187.html -
References () http://packetstormsecurity.com/files/134497/Apache-Cordova-3.7.2-Whitelist-Failure.html - () http://packetstormsecurity.com/files/134497/Apache-Cordova-3.7.2-Whitelist-Failure.html -
References () http://www.securityfocus.com/archive/1/536944/100/0/threaded - () http://www.securityfocus.com/archive/1/536944/100/0/threaded -
References () http://www.securityfocus.com/bid/77677 - () http://www.securityfocus.com/bid/77677 -
References () https://cordova.apache.org/announcements/2015/11/20/security.html - Vendor Advisory () https://cordova.apache.org/announcements/2015/11/20/security.html - Vendor Advisory

Information

Published : 2015-11-23 11:59

Updated : 2024-11-21 02:32


NVD link : CVE-2015-5256

Mitre link : CVE-2015-5256

CVE.ORG link : CVE-2015-5256


JSON object : View

Products Affected

apache

  • cordova
CWE
CWE-264

Permissions, Privileges, and Access Controls