Apache Cordova-Android before 4.1.0, when an application relies on a remote server, improperly implements a JavaScript whitelist protection mechanism, which allows attackers to bypass intended access restrictions via a crafted URI.
                
            References
                    Configurations
                    History
                    21 Nov 2024, 02:32
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://jvn.jp/en/jp/JVN18889193/index.html - | |
| References | () http://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000187.html - | |
| References | () http://packetstormsecurity.com/files/134497/Apache-Cordova-3.7.2-Whitelist-Failure.html - | |
| References | () http://www.securityfocus.com/archive/1/536944/100/0/threaded - | |
| References | () http://www.securityfocus.com/bid/77677 - | |
| References | () https://cordova.apache.org/announcements/2015/11/20/security.html - Vendor Advisory | 
Information
                Published : 2015-11-23 11:59
Updated : 2025-04-12 10:46
NVD link : CVE-2015-5256
Mitre link : CVE-2015-5256
CVE.ORG link : CVE-2015-5256
JSON object : View
Products Affected
                apache
- cordova
CWE
                
                    
                        
                        CWE-264
                        
            Permissions, Privileges, and Access Controls
