Vulnerabilities
Vulnerable Software
Apache:  >> Cordova  >> 0.9.6  Security Vulnerabilities
After the Android platform is added to Cordova the first time, or after a project is created using the build scripts, the scripts will fetch Gradle on the first build. However, since the default URI is not using https, it is vulnerable to a MiTM and the Gradle executable is not safe. The severity of this issue is high due to the fact that the build scripts immediately start a build after Gradle has been fetched. Developers who are concerned about this issue should install version 6.1.2 or higher of Cordova-Android. If developers are unable to install the latest version, this vulnerability can easily be mitigated by setting the CORDOVA_ANDROID_GRADLE_DISTRIBUTION_URL environment variable to https://services.gradle.org/distributions/gradle-2.14.1-all.zip
CVSS Score
7.4
EPSS Score
0.008
Published
2018-02-01
Apache Cordova Android before 3.7.2 and 4.x before 4.0.2, when an application does not set explicit values in config.xml, allows remote attackers to modify undefined secondary configuration variables (preferences) via a crafted intent: URL.
CVSS Score
5.3
EPSS Score
0.006
Published
2017-10-27
Product: Apache Cordova Android 5.2.2 and earlier. The application calls methods of the Log class. Messages passed to these methods (Log.v(), Log.d(), Log.i(), Log.w(), and Log.e()) are stored in a series of circular buffers on the device. By default, a maximum of four 16 KB rotated logs are kept in addition to the current log. The logged data can be read using Logcat on the device. When using platforms prior to Android 4.1 (Jelly Bean), the log data is not sandboxed per application; any application installed on the device has the capability to read data logged by other applications.
CVSS Score
7.5
EPSS Score
0.005
Published
2017-05-09
Apache Cordova iOS before 4.0.0 allows remote attackers to execute arbitrary plugins via a link.
CVSS Score
4.4
EPSS Score
0.024
Published
2016-05-09
Apache Cordova iOS before 4.0.0 might allow attackers to bypass a URL whitelist protection mechanism in an app and load arbitrary resources by leveraging unspecified methods.
CVSS Score
5.3
EPSS Score
0.002
Published
2016-05-09
Apache Cordova-Android before 3.7.0 improperly generates random values for BridgeSecret data, which makes it easier for attackers to conduct bridge hijacking attacks by predicting a value.
CVSS Score
5.0
EPSS Score
0.026
Published
2015-11-23
Apache Cordova-Android before 4.1.0, when an application relies on a remote server, improperly implements a JavaScript whitelist protection mechanism, which allows attackers to bypass intended access restrictions via a crafted URI.
CVSS Score
4.3
EPSS Score
0.013
Published
2015-11-23
Apache Cordova Android before 3.5.1 allows remote attackers to change the start page via a crafted intent URL.
CVSS Score
6.4
EPSS Score
0.012
Published
2014-11-15
Apache Cordova 3.3.0 and earlier and Adobe PhoneGap 2.9.0 and earlier do not anchor the end of domain-name regular expressions, which allows remote attackers to bypass a whitelist protection mechanism via a domain name that contains an acceptable name as an initial substring.
CVSS Score
7.5
EPSS Score
0.011
Published
2014-03-03
Apache Cordova 3.3.0 and earlier and Adobe PhoneGap 2.9.0 and earlier allow remote attackers to bypass intended device-resource restrictions of an event-based bridge via a crafted library clone that leverages IFRAME script execution and waits a certain amount of time for an OnJsPrompt handler return value as an alternative to correct synchronization.
CVSS Score
7.5
EPSS Score
0.079
Published
2014-03-03


Contact Us

Shodan ® - All rights reserved