Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAKkdKCC_PKa-s=jk9+Bq+bXcJ3_RmOH-Gs3BjDGMOje9WwMNUw@mail.gmail.com>
Date: Wed, 27 Apr 2016 15:19:16 -0400
From: Tony Homer <ajh158@...il.com>
To: dev@...dova.apache.org, private@...dova.apache.org, 
	"JPCERT/CC" <vuls@...ert.or.jp>, security@...che.org, oss-security@...ts.openwall.com, 
	bugtraq@...urityfocus.com
Subject: CVE-2015-5207 - Bypass of Access Restrictions in Apache Cordova iOS

CVE-2015-5207 - Bypass of Access Restrictions in Apache Cordova iOS
Severity: High
Vendor: The Apache Software Foundation
Versions Affected:cordova-ios 3.9.1 and below
Description:Apache Cordova iOS contains 2 methods to bypass the URL access
restrictions provided by the whitelist. An attacker can use any of the 2
methods to load malicious resources in an app that uses a whitelist to only
load trusted resources.
Upgrade path:Developers who are concerned about this issue should install
version 4.0.0 or higher of the cordova-ios platform.
Credit:This issue was discovered by Muneaki Nishimura (nishimunea) of
Recruit Technologies Co.,Ltd.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.