Description
Apache Cordova-Android before 4.1.0, when an application relies on a remote server, improperly implements a JavaScript whitelist protection mechanism, which allows attackers to bypass intended access restrictions via a crafted URI.
Remediation
References
http://jvn.jp/en/jp/JVN18889193/index.html
http://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000187.html
http://packetstormsecurity.com/files/134497/Apache-Cordova-3.7.2-Whitelist-Failure.html
http://www.securityfocus.com/archive/1/536944/100/0/threaded
http://www.securityfocus.com/bid/77677
https://cordova.apache.org/announcements/2015/11/20/security.html
Related Vulnerabilities
CVE-2023-46233 Vulnerability in maven package org.webjars.bower:crypto-js
CVE-2022-34198 Vulnerability in maven package org.jenkins-ci.plugins:stashbranchparameter
CVE-2023-40037 Vulnerability in maven package org.apache.nifi:nifi-jms-processors
CVE-2023-33001 Vulnerability in maven package com.datapipe.jenkins.plugins:hashicorp-vault-plugin
CVE-2023-3315 Vulnerability in maven package org.jenkins-ci.plugins:teamconcert