-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2015.1411
         CVE-2015-1835: Remote exploit of secondary configuration
                  variables in Apache Cordova on Android
                                29 May 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:          Apache Cordova
Publisher:        The Apache Software Foundation
Operating System: Android
Impact/Access:    Modify Arbitrary Files -- Remote with User Interaction
Resolution:       Patch/Upgrade
CVE Names:        CVE-2015-1835  

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

CVE-2015-1835: Remote exploit of secondary configuration variables in 
               Apache Cordova on Android

Severity:      High

Vendor:        The Apache Software Foundation

Versions Affected:
               Cordova Android up to 4.0.1 (3.7.2 excluded)

Description:

Android applications built with the Cordova framework that don't have 
explicit values set in Config.xml can have undefined configuration 
variables set by Intent.  This can cause unwanted dialogs appearing 
in applications and changes in the application behaviour that can 
include the app force-closing.

The latest release of Cordova Android entirely removes the ability 
of configuration parameters to be set by intents.  This change is 
an API change in the platform, and third-party plugins that use 
values set in the config.xml should make sure that they use the 
preferences API instead of relying on the Intent bundle, whcih 
can be manipulated in this case.

Upgrade path:

Developers who are concerned about this should rebuild their 
applications with either Cordova Android 4.0.2, or Cordova 3.7.4 
if they are unable to upgrade to Cordova 4.0.2. Developers should 
also make sure that variables that they wish to have protected 
are specified in their config.xml.

Credit:

This issue was discovered by Seven Shen of Trend Micro Mobile Threat Research Team
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0
Comment: This message is encrypted and/or signed with PGP (gnu-pg, gpg). Contact dirkx@webweaving.org if you cannot read it.

iQCVAwUBVWbyfDGmPZbsFAuBAQim5gP8C/3m6DPI4YljLINtgtXgK+NOI2InjBPI
MA0bb10da+XUCLrcHoJnMHdBL2aGhltnKapNjp4I4gph0QIkhlhIUXelHojPSjRH
3ectaNsFCTJHofHKiMROtH3Fb5Gqo5U7LPtduvjCE4q/rJB/9LOHIojwWw/VqQo3
eBPdk/6bSaw=
=ax4a
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Elng
-----END PGP SIGNATURE-----