cordova-android@5.3.0-nightly.2016.10.17.2e37d2c2 vulnerabilities

cordova-android release

Direct Vulnerabilities

Known vulnerabilities in the cordova-android package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Information Exposure

cordova-android is an Android application library that allows for Cordova-based projects to be built for the Android Platform.

Affected versions of this package are vulnerable to Information Exposure. It called methods of the Log class. Messages passed to its methods were stored in a series of circular buffers on the device. By default, a maximum of four 16 KB rotated logs were kept in addition to the current log. The logged data could be read using Logcat on the device. When using platforms prior to Android 4.1, the log data is not sandboxed per application, any application installed on the device has the capability to read data logged by other applications.

How to fix Information Exposure?

Upgrade cordova-android to version 6.0.0 or higher.

<6.0.0
  • M
Resources Downloaded over Insecure Protocol

cordova-android is an Android application library that allows for Cordova-based projects to be built for the Android Platform.

Affected versions of the package are vulnerable to Man in the Middle (MitM) attacks due to downloading resources over an insecure protocol.

The build scripts would fetch Gradle using HTTP instead of HTTPS

Without a secure connection, it is possible for an attacker to intercept this connection and alter the packages received. In serious cases, this may even lead to Remote Code Execution (RCE) on your host server.

How to fix Resources Downloaded over Insecure Protocol?

Upgrade cordova-android to version 6.1.2 or higher.

<6.1.2