Description
ios/CDVFileTransfer.m in the Apache Cordova File-Transfer standalone plugin (org.apache.cordova.file-transfer) before 0.4.2 for iOS and the File-Transfer plugin for iOS from Cordova 2.4.0 through 2.9.0 might allow remote attackers to spoof SSL servers by leveraging a default value of true for the trustAllHosts option.
Remediation
References
https://github.com/apache/cordova-plugin-file-transfer/commit/a1d6fc07e8a40c1b2b16f4103c403b30e1089668
https://exchange.xforce.ibmcloud.com/vulnerabilities/91561
http://seclists.org/fulldisclosure/2014/Mar/29
http://d3adend.org/blog/?p=403
http://www.securityfocus.com/archive/1/531335/100/0/threaded
https://mail-archives.apache.org/mod_mbox/cordova-dev/201403.mbox/%3CCAK_TSXKL9JtkehHC0jEoRwdvVKXt-d5uj40EwNY-Gk3ttX=wJw%40mail.gmail.com%3E
Related Vulnerabilities
CVE-2018-5158 Vulnerability in maven package org.webjars.bowergithub.mozilla:pdfjs-dist
CVE-2023-40572 Vulnerability in maven package org.xwiki.platform:xwiki-platform-oldcore
CVE-2019-14820 Vulnerability in maven package org.keycloak:keycloak-core
CVE-2019-1010266 Vulnerability in maven package org.webjars.bower:lodash
CVE-2022-0672 Vulnerability in maven package org.eclipse.lemminx:lemminx-parent