Page 4 of 20 results (0.005 seconds)

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

The CDVInAppBrowser class in the Apache Cordova In-App-Browser standalone plugin (org.apache.cordova.inappbrowser) before 0.3.2 for iOS and the In-App-Browser plugin for iOS from Cordova 2.6.0 through 2.9.0 does not properly validate callback identifiers, which allows remote attackers to execute arbitrary JavaScript in the host page and consequently gain privileges via a crafted gap-iab: URI. La clase CDVInAppBrowser en el plugin independiente Apache Cordova In-App-Browser (org.apache.cordova.inappbrowser) en versiones anteriores a la 0.3.2 para iOS y el plugin In-App-Browser para iOS de Cordova desde la versión 2.6.0 hasta la 2.9.0 no valida correctamente los identificadores de devolución de llamada. Esto permite que atacantes remotos ejecuten código JavaScript arbitrario en la página del host y, consecuentemente, obtengan privilegios mediante un URI gap-iab: manipulado. • http://d3adend.org/blog/?p=403 http://seclists.org/fulldisclosure/2014/Mar/30 http://www.securityfocus.com/archive/1/531334/100/0/threaded http://www.securityfocus.com/bid/65959 https://exchange.xforce.ibmcloud.com/vulnerabilities/91560 https://github.com/apache/cordova-plugin-inappbrowser/commit/26702cb0720c5c394b407c23570136c53171fa55 https://mail-archives.apache.org/mod_mbox/cordova-dev/201403.mbox/%3CCAK_TSXLGJag5Q9ATUCbFtkWvMWX9XnC80kKp-HKi25gPcvV4gw%40mail.gmail.com%3E • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 2%CPEs: 29EXPL: 0

Apache Cordova 3.3.0 and earlier and Adobe PhoneGap 2.9.0 and earlier allow remote attackers to bypass intended device-resource restrictions of an event-based bridge via a crafted library clone that leverages IFRAME script execution and directly accesses bridge JavaScript objects, as demonstrated by certain cordova.require calls. Apache Cordova 3.3.0 y anteriores y Adobe PhoneGap 2.9.0 y anteriores permiten a atacantes remotos evadir restricciones "device-resource" de un puente basado en eventos a través de un clon de librería manipulada que aprovecha la ejecución de script IFRAME y acceda directamente objetos JavaScript puente, tal y como se demostró con ciertas llamadas cordova.require. • http://openwall.com/lists/oss-security/2014/02/07/9 http://packetstormsecurity.com/files/124954/apachecordovaphonegap-bypass.txt http://seclists.org/bugtraq/2014/Jan/96 http://www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf http://www.internetsociety.org/ndss2014/programme#session3 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 0%CPEs: 29EXPL: 1

Apache Cordova 3.3.0 and earlier and Adobe PhoneGap 2.9.0 and earlier do not anchor the end of domain-name regular expressions, which allows remote attackers to bypass a whitelist protection mechanism via a domain name that contains an acceptable name as an initial substring. Apache Cordova 3.3.0 y anteriores y Adobe PhoneGap 2.9.0 y anteriores no identifican las expresiones regulares del final de un nombre de dominio, lo que permite a atacantes remotos evadir un mecanismo de protección de lista blanca a través de un nombre de dominio que contiene un nombre aceptable como subcadena inicial. • http://labs.mwrinfosecurity.com/blog/2012/04/30/building-android-javajavascript-bridges http://openwall.com/lists/oss-security/2014/02/07/9 http://packetstormsecurity.com/files/124954/apachecordovaphonegap-bypass.txt http://seclists.org/bugtraq/2014/Jan/96 http://www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf http://www.internetsociety.org/ndss2014/programme#session3 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 1%CPEs: 33EXPL: 1

Apache Cordova 3.3.0 and earlier and Adobe PhoneGap 2.9.0 and earlier on Windows Phone 7 and 8 do not properly restrict navigation events, which allows remote attackers to bypass intended device-resource restrictions via content that is accessed (1) in an IFRAME element or (2) with the XMLHttpRequest method by a crafted application. Apache Cordova 3.3.0 y anteriores y Adobe PhoneGap 2.9.0 y anteriores en Windows Phone 7 y 8 no restringen debidamente eventos de navegación, lo que permite a atacantes remotos evadir restricciones "device-resource" a través de contenido que es accedido (1) en un elemento IFRAME o (2) con el método XMLHttpRequest mediante una aplicación manipulada. • http://openwall.com/lists/oss-security/2014/02/07/9 http://packetstormsecurity.com/files/124954/apachecordovaphonegap-bypass.txt http://seclists.org/bugtraq/2014/Jan/96 http://www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf http://www.internetsociety.org/ndss2014/programme#session3 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 2%CPEs: 29EXPL: 1

Apache Cordova 3.3.0 and earlier and Adobe PhoneGap 2.9.0 and earlier allow remote attackers to bypass intended device-resource restrictions of an event-based bridge via a crafted library clone that leverages IFRAME script execution and waits a certain amount of time for an OnJsPrompt handler return value as an alternative to correct synchronization. Apache Cordova 3.3.0 y anteriores y Adobe PhoneGap 2.9.0 y anteriores permiten a atacantes remotos evadir restricciones "device-resource" de un puente basado en eventos a través de un clon de libraría manipulada que aprovecha la ejecución de script IFRAME y espera una cierta cantidad de tiempo para un valor de vuelta del manejador OnJsPrompt como alternativa a la sincronización correcta. • http://openwall.com/lists/oss-security/2014/02/07/9 http://packetstormsecurity.com/files/124954/apachecordovaphonegap-bypass.txt http://seclists.org/bugtraq/2014/Jan/96 http://www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf http://www.internetsociety.org/ndss2014/programme#session3 • CWE-264: Permissions, Privileges, and Access Controls •