Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 27 Apr 2016 15:19:16 -0400
From: Tony Homer <ajh158@...il.com>
To: dev@...dova.apache.org, private@...dova.apache.org, 
	"JPCERT/CC" <vuls@...ert.or.jp>, security@...che.org, oss-security@...ts.openwall.com, 
	bugtraq@...urityfocus.com
Subject: CVE-2015-5207 - Bypass of Access Restrictions in Apache Cordova iOS

CVE-2015-5207 - Bypass of Access Restrictions in Apache Cordova iOS
Severity: High
Vendor: The Apache Software Foundation
Versions Affected:cordova-ios 3.9.1 and below
Description:Apache Cordova iOS contains 2 methods to bypass the URL access
restrictions provided by the whitelist. An attacker can use any of the 2
methods to load malicious resources in an app that uses a whitelist to only
load trusted resources.
Upgrade path:Developers who are concerned about this issue should install
version 4.0.0 or higher of the cordova-ios platform.
Credit:This issue was discovered by Muneaki Nishimura (nishimunea) of
Recruit Technologies Co.,Ltd.

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ