13.0.0
10 years ago
6 months ago
Known vulnerabilities in the cordova-android package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
cordova-android is an Android application library that allows for Cordova-based projects to be built for the Android Platform. Affected versions of this package are vulnerable to Information Exposure. It called methods of the Log class. Messages passed to its methods were stored in a series of circular buffers on the device. By default, a maximum of four 16 KB rotated logs were kept in addition to the current log. The logged data could be read using How to fix Information Exposure? Upgrade | <6.0.0 |
cordova-android is an Android application library that allows for Cordova-based projects to be built for the Android Platform. Affected versions of the package are vulnerable to Man in the Middle (MitM) attacks due to downloading resources over an insecure protocol. The build scripts would fetch Gradle using HTTP instead of HTTPS Without a secure connection, it is possible for an attacker to intercept this connection and alter the packages received. In serious cases, this may even lead to Remote Code Execution (RCE) on your host server. How to fix Resources Downloaded over Insecure Protocol? Upgrade | <6.1.2 |
Affected versions of the package are vulnerable to Arbitrary Command Injection. Apache Cordova Android before 3.7.2 and 4.x before 4.0.2, when an application does not set explicit values in config.xml, allows remote attackers to modify undefined secondary configuration variables (preferences) via a crafted intent: URL. How to fix Arbitrary Command Injection? Upgrade | <3.7.2>=4.0.0 <4.0.2 |
Affected versions of the package are vulnerable to Arbitrary Code Execution. When an application relies on a remote server, improperly implements a JavaScript whitelist protection mechanism. This allows attackers to bypass intended access restrictions via a crafted URI. How to fix Arbitrary Code Execution? Upgrade | <4.1.1 |