Vulnerability Description
Apache Cordova-Android before 4.1.0, when an application relies on a remote server, improperly implements a JavaScript whitelist protection mechanism, which allows attackers to bypass intended access restrictions via a crafted URI.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Cordova | <= 3.6.4 |
Related Weaknesses (CWE)
References
- http://jvn.jp/en/jp/JVN18889193/index.html
- http://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000187.html
- http://packetstormsecurity.com/files/134497/Apache-Cordova-3.7.2-Whitelist-Failu
- http://www.securityfocus.com/archive/1/536944/100/0/threaded
- http://www.securityfocus.com/bid/77677
- https://cordova.apache.org/announcements/2015/11/20/security.htmlVendor Advisory
- http://jvn.jp/en/jp/JVN18889193/index.html
- http://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000187.html
- http://packetstormsecurity.com/files/134497/Apache-Cordova-3.7.2-Whitelist-Failu
- http://www.securityfocus.com/archive/1/536944/100/0/threaded
- http://www.securityfocus.com/bid/77677
- https://cordova.apache.org/announcements/2015/11/20/security.htmlVendor Advisory
FAQ
What is CVE-2015-5256?
CVE-2015-5256 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Apache Cordova-Android before 4.1.0, when an application relies on a remote server, improperly implements a JavaScript whitelist protection mechanism, which allows attackers to bypass intended access ...
How severe is CVE-2015-5256?
CVE-2015-5256 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-5256?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Cordova.