cordova-android@3.5.0 vulnerabilities

cordova-android release

Direct Vulnerabilities

Known vulnerabilities in the cordova-android package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Information Exposure

cordova-android is an Android application library that allows for Cordova-based projects to be built for the Android Platform.

Affected versions of this package are vulnerable to Information Exposure. It called methods of the Log class. Messages passed to its methods were stored in a series of circular buffers on the device. By default, a maximum of four 16 KB rotated logs were kept in addition to the current log. The logged data could be read using Logcat on the device. When using platforms prior to Android 4.1, the log data is not sandboxed per application, any application installed on the device has the capability to read data logged by other applications.

How to fix Information Exposure?

Upgrade cordova-android to version 6.0.0 or higher.

<6.0.0
  • M
Resources Downloaded over Insecure Protocol

cordova-android is an Android application library that allows for Cordova-based projects to be built for the Android Platform.

Affected versions of the package are vulnerable to Man in the Middle (MitM) attacks due to downloading resources over an insecure protocol.

The build scripts would fetch Gradle using HTTP instead of HTTPS

Without a secure connection, it is possible for an attacker to intercept this connection and alter the packages received. In serious cases, this may even lead to Remote Code Execution (RCE) on your host server.

How to fix Resources Downloaded over Insecure Protocol?

Upgrade cordova-android to version 6.1.2 or higher.

<6.1.2
  • M
Arbitrary Command Injection

cordova-android is an Android application library that allows for Cordova-based projects to be built for the Android Platform.

Affected versions of the package are vulnerable to Arbitrary Command Injection. Apache Cordova Android before 3.7.2 and 4.x before 4.0.2, when an application does not set explicit values in config.xml, allows remote attackers to modify undefined secondary configuration variables (preferences) via a crafted intent: URL.

How to fix Arbitrary Command Injection?

Upgrade cordova-android to version 3.7.2 or higher.

<3.7.2 >=4.0.0 <4.0.2
  • M
Arbitrary Code Execution

cordova-android is an Android application library that allows for Cordova-based projects to be built for the Android Platform.

Affected versions of the package are vulnerable to Arbitrary Code Execution. When an application relies on a remote server, improperly implements a JavaScript whitelist protection mechanism. This allows attackers to bypass intended access restrictions via a crafted URI.

How to fix Arbitrary Code Execution?

Upgrade cordova-android to version 4.1.1 or higher.

<4.1.1
  • M
Cross-site Scripting (XSS)

cordova-android is an Android application library that allows for Cordova-based projects to be built for the Android Platform.

Affected versions of the package are vulnerable to Cross-Application Scripting. This allows remote attackers to change the start page via a crafted intent URL.

How to fix Cross-site Scripting (XSS)?

Upgrade cordova-android to version 3.5.1 or higher.

<3.5.1
  • L
Information Exposure

cordova-android is an Android application library that allows for Cordova-based projects to be built for the Android Platform.

Affected versions of the package are vulnerable to Information Exposure. This allows remote attackers to open and send data to arbitrary applications via a URL with a crafted URI scheme for an Android intent.

How to fix Information Exposure?

Upgrade cordova-android to version 3.5.1 or higher.

<3.5.1
  • M
HTTP Whitelist Bypass

cordova-android is an Android application library that allows for Cordova-based projects to be built for the Android Platform.

Affected versions of the package are vulnerable to HTTP Whiteist Bypass. This allows remote attackers to bypass the HTTP whitelist and connect to arbitrary servers by using JavaScript to open WebSocket connections through WebView.

How to fix HTTP Whitelist Bypass?

Upgrade cordova-android to version 3.5.1 or higher.

<3.5.1
  • L
Insecure Randomness

cordova-android is an Android application library that allows for Cordova-based projects to be built for the Android Platform.

Affected versions of the package are vulnerable to Insecure Randomness. It improperly generates random values for BridgeSecret data, which makes it easier for attackers to conduct bridge hijacking attacks by predicting a value.

How to fix Insecure Randomness?

Upgrade cordova-android to version 3.7.1 or higher.

<3.7.1