Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 23 Feb 2016 23:57:13 +0000
To: Carlos Santana <>
	"" <>, ASF Security Team <>
Subject: RE: [4-3801000010480] [Update 2/20/16 CVE-2015-5256] Apache Cordova
 vulnerable to improper application of whitelist restrictions on Android


Our engineering team reviewed this issue and realized this was reported to
us back in Sept 2015 by JP Cert.

Thank you,

On 02/22/16 15:54:11 wrote:

Thank you for the notification.
We will assign this to our dev team to review.
It will be tracked as AndroidID-27299922.


On 02/21/16 11:56:58 wrote:

*Updated 02/20/2016*

Apache Cordova has re-visited CVE-2015-5256 "Apache Cordova vulnerable to
improper application of whitelist restrictions on Android”. Upon further
investigation we found that the vulnerability is more limited than was
previously understood.
We are lowering the severity to Low, and updating the description, affected
versions, and upgrade path.

The updated text of the CVE is included below:

Apache Cordova PMC


*Updated 02/20/2016*

CVE-2015-5256: Apache Cordova vulnerable to improper application of
whitelist restrictions on Android

Severity: Low

Versions Affected:
Cordova Android with whitelist functionality


Android applications created using Apache Cordova that use a remote server
contain a vulnerability where whitelist restrictions for urls using
protocols http and https are not properly applied.  Whitelist cannot block
network redirects from a whitelisted remote website to a non-whitelisted

Upgrade path:

There is no specific software patch for this vulnerability. Developers that
are concerned about this should make sure to only whitelist trusted
websites, and make sure that whitelisted websites don’t redirect to a
malicious website.
Developers using should also use SSL, as well as Content Security
Policy(CSP) to further mitigate this issue. It’s always recommended for
developers to upgrade to the latest version of Cordova Android.

Credit: Muneaki Nishimura of Sony Digital Network Applications, Inc

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.