cordova-android@3.6.3 vulnerabilities
cordova-android release
-
latest version
13.0.0
-
latest non vulnerable version
-
first published
10 years ago
-
latest version published
6 months ago
-
licenses detected
- >=0
Direct Vulnerabilities
Known vulnerabilities in the cordova-android package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
cordova-android is an Android application library that allows for Cordova-based projects to be built for the Android Platform. Affected versions of this package are vulnerable to Information Exposure. It called methods of the Log class. Messages passed to its methods were stored in a series of circular buffers on the device. By default, a maximum of four 16 KB rotated logs were kept in addition to the current log. The logged data could be read using How to fix Information Exposure? Upgrade |
<6.0.0
|
cordova-android is an Android application library that allows for Cordova-based projects to be built for the Android Platform. Affected versions of the package are vulnerable to Man in the Middle (MitM) attacks due to downloading resources over an insecure protocol. The build scripts would fetch Gradle using HTTP instead of HTTPS Without a secure connection, it is possible for an attacker to intercept this connection and alter the packages received. In serious cases, this may even lead to Remote Code Execution (RCE) on your host server. How to fix Resources Downloaded over Insecure Protocol? Upgrade |
<6.1.2
|
Affected versions of the package are vulnerable to Arbitrary Command Injection. Apache Cordova Android before 3.7.2 and 4.x before 4.0.2, when an application does not set explicit values in config.xml, allows remote attackers to modify undefined secondary configuration variables (preferences) via a crafted intent: URL. How to fix Arbitrary Command Injection? Upgrade |
<3.7.2
>=4.0.0 <4.0.2
|
Affected versions of the package are vulnerable to Arbitrary Code Execution. When an application relies on a remote server, improperly implements a JavaScript whitelist protection mechanism. This allows attackers to bypass intended access restrictions via a crafted URI. How to fix Arbitrary Code Execution? Upgrade |
<4.1.1
|
Affected versions of the package are vulnerable to Insecure Randomness. It improperly generates random values for BridgeSecret data, which makes it easier for attackers to conduct bridge hijacking attacks by predicting a value. How to fix Insecure Randomness? Upgrade |
<3.7.1
|