Vulnerability Details CVE-2017-3160
After the Android platform is added to Cordova the first time, or after a project is created using the build scripts, the scripts will fetch Gradle on the first build. However, since the default URI is not using https, it is vulnerable to a MiTM and the Gradle executable is not safe. The severity of this issue is high due to the fact that the build scripts immediately start a build after Gradle has been fetched. Developers who are concerned about this issue should install version 6.1.2 or higher of Cordova-Android. If developers are unable to install the latest version, this vulnerability can easily be mitigated by setting the CORDOVA_ANDROID_GRADLE_DISTRIBUTION_URL environment variable to https://services.gradle.org/distributions/gradle-2.14.1-all.zip
Exploit prediction scoring system (EPSS) score
EPSS Score 0.008
EPSS Ranking 73.3%
CVSS Severity
CVSS v3 Score 7.4
CVSS v2 Score 5.8
Products affected by CVE-2017-3160
-
cpe:2.3:a:apache:cordova:0.9.0
-
cpe:2.3:a:apache:cordova:0.9.1
-
cpe:2.3:a:apache:cordova:0.9.2
-
cpe:2.3:a:apache:cordova:0.9.3
-
cpe:2.3:a:apache:cordova:0.9.4
-
cpe:2.3:a:apache:cordova:0.9.5
-
cpe:2.3:a:apache:cordova:0.9.5.1
-
cpe:2.3:a:apache:cordova:0.9.6
-
cpe:2.3:a:apache:cordova:0.9.6.1
-
cpe:2.3:a:apache:cordova:1.0.0
-
cpe:2.3:a:apache:cordova:1.1.0
-
cpe:2.3:a:apache:cordova:1.2.0
-
cpe:2.3:a:apache:cordova:1.3.0
-
cpe:2.3:a:apache:cordova:1.4.0
-
cpe:2.3:a:apache:cordova:1.4.1
-
cpe:2.3:a:apache:cordova:1.5.0
-
cpe:2.3:a:apache:cordova:1.6.0
-
cpe:2.3:a:apache:cordova:1.6.1
-
cpe:2.3:a:apache:cordova:1.7.0
-
cpe:2.3:a:apache:cordova:1.8.0
-
cpe:2.3:a:apache:cordova:1.8.1
-
cpe:2.3:a:apache:cordova:1.9.0
-
cpe:2.3:a:apache:cordova:2.0.0
-
cpe:2.3:a:apache:cordova:2.1.0
-
cpe:2.3:a:apache:cordova:2.2.0
-
cpe:2.3:a:apache:cordova:2.3.0
-
cpe:2.3:a:apache:cordova:2.4.0
-
cpe:2.3:a:apache:cordova:2.5.0
-
cpe:2.3:a:apache:cordova:2.6.0
-
cpe:2.3:a:apache:cordova:2.7.0
-
cpe:2.3:a:apache:cordova:2.8.0
-
cpe:2.3:a:apache:cordova:2.8.1
-
cpe:2.3:a:apache:cordova:2.9.0
-
cpe:2.3:a:apache:cordova:2.9.1
-
cpe:2.3:a:apache:cordova:3.0.0
-
cpe:2.3:a:apache:cordova:3.1.0
-
cpe:2.3:a:apache:cordova:3.2.0
-
cpe:2.3:a:apache:cordova:3.3.0
-
cpe:2.3:a:apache:cordova:3.4.0
-
cpe:2.3:a:apache:cordova:3.5.0
-
cpe:2.3:a:apache:cordova:3.5.1
-
cpe:2.3:a:apache:cordova:3.6.0
-
cpe:2.3:a:apache:cordova:3.6.1
-
cpe:2.3:a:apache:cordova:3.6.3
-
cpe:2.3:a:apache:cordova:3.6.4
-
cpe:2.3:a:apache:cordova:3.7.0
-
cpe:2.3:a:apache:cordova:3.7.1
-
cpe:2.3:a:apache:cordova:3.7.2
-
cpe:2.3:a:apache:cordova:4.0.0
-
cpe:2.3:a:apache:cordova:4.0.1
-
cpe:2.3:a:apache:cordova:4.0.2
-
cpe:2.3:a:apache:cordova:4.1.0
-
cpe:2.3:a:apache:cordova:4.1.1
-
cpe:2.3:a:apache:cordova:5.0.0
-
cpe:2.3:a:apache:cordova:5.1.0
-
cpe:2.3:a:apache:cordova:5.1.1
-
cpe:2.3:a:apache:cordova:5.2.0
-
cpe:2.3:a:apache:cordova:5.2.1
-
cpe:2.3:a:apache:cordova:5.2.2
-
cpe:2.3:a:apache:cordova:6.0.0
-
cpe:2.3:a:apache:cordova:6.1.0
-
cpe:2.3:a:apache:cordova:6.1.1