Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2015.1411 CVE-2015-1835: Remote exploit of secondary configuration variables in Apache Cordova on Android 29 May 2015 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Apache Cordova Publisher: The Apache Software Foundation Operating System: Android Impact/Access: Modify Arbitrary Files -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2015-1835 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 CVE-2015-1835: Remote exploit of secondary configuration variables in Apache Cordova on Android Severity: High Vendor: The Apache Software Foundation Versions Affected: Cordova Android up to 4.0.1 (3.7.2 excluded) Description: Android applications built with the Cordova framework that don't have explicit values set in Config.xml can have undefined configuration variables set by Intent. This can cause unwanted dialogs appearing in applications and changes in the application behaviour that can include the app force-closing. The latest release of Cordova Android entirely removes the ability of configuration parameters to be set by intents. This change is an API change in the platform, and third-party plugins that use values set in the config.xml should make sure that they use the preferences API instead of relying on the Intent bundle, whcih can be manipulated in this case. Upgrade path: Developers who are concerned about this should rebuild their applications with either Cordova Android 4.0.2, or Cordova 3.7.4 if they are unable to upgrade to Cordova 4.0.2. Developers should also make sure that variables that they wish to have protected are specified in their config.xml. Credit: This issue was discovered by Seven Shen of Trend Micro Mobile Threat Research Team - -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0 Comment: This message is encrypted and/or signed with PGP (gnu-pg, gpg). Contact dirkx@webweaving.org if you cannot read it. iQCVAwUBVWbyfDGmPZbsFAuBAQim5gP8C/3m6DPI4YljLINtgtXgK+NOI2InjBPI MA0bb10da+XUCLrcHoJnMHdBL2aGhltnKapNjp4I4gph0QIkhlhIUXelHojPSjRH 3ectaNsFCTJHofHKiMROtH3Fb5Gqo5U7LPtduvjCE4q/rJB/9LOHIojwWw/VqQo3 eBPdk/6bSaw= =ax4a - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVWe3VRLndAQH1ShLAQLCLg/9FwWhF+vweHCjQJlfB8O+O4u/bz925vsp PiydIXaAUgEpDonh4UTJR/dGnMW1BOUwTdge8v8nj4dqJXdUHxXBVTYJwt1Mt+16 uKtHY2Um2y350Juz4NaYexFJM69qBKDsU/+mRdzZuPaz4/nuJ9rE4h+fZTVr043T KQ9E/6sD4rIO3L0SW0QiEhFIYdWKYUzHqbroXQH09iu6B8jYEFY1sYlWAV5GhkbR SKSw39vaU0IIcDYTOXjhPj1e7PGvja4ztm+uNHYi2cYyZ3gVShmqDqvCrqwomDLM lh5JCXLV2V96YWhNHNTVxX4ZWZQLg33qJxr/fxgyOKnYL4H2cyDQug/X/0sKYXFS 870hoIwNiHUl3XHkABrUPJeUkUdtXcUTAHj7U8f4KGA8RxzKkf/RHnRyg99G3GTd F0IKET/0ANkP5dbaikvWfW4c1DY8G3hG/B4eOo81NA17HO299W1UKhPQoqCTIIXM 1dXkcdm2saww96oXFX3cjw96ELpp0mSZ0YMK2bsodqxzqbkxiYHOCu/DUeUvm2Ar ktjwTbTrMlAgHPSjClEnGSjCAVkDXLIxi5/yfN0/baIkc55jfeJ66kpGpdlEa9yl 0DnX+nEKcMtUNYjgd3tPG33sMBKq9PGw9oxkKCWrIBOJdab8DkKhT33aNhXjf/kY Zsyf8kwB2Ms= =Elng -----END PGP SIGNATURE-----