fkie_cve-2014-1884
Vulnerability from fkie_nvd
Published
2014-03-03 04:50
Modified
2024-11-21 02:05
Severity ?
Summary
Apache Cordova 3.3.0 and earlier and Adobe PhoneGap 2.9.0 and earlier on Windows Phone 7 and 8 do not properly restrict navigation events, which allows remote attackers to bypass intended device-resource restrictions via content that is accessed (1) in an IFRAME element or (2) with the XMLHttpRequest method by a crafted application.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | cordova | * | |
apache | cordova | 3.0.0 | |
apache | cordova | 3.0.0 | |
apache | cordova | 3.1.0 | |
apache | cordova | 3.1.0 | |
apache | cordova | 3.2.0 | |
apache | cordova | 3.2.0 | |
apache | cordova | 3.3.0 | |
microsoft | windows_phone | 7 | |
microsoft | windows_phone | 8 | |
adobe | phonegap | * | |
adobe | phonegap | 2.0.0 | |
adobe | phonegap | 2.0.0 | |
adobe | phonegap | 2.1.0 | |
adobe | phonegap | 2.2.0 | |
adobe | phonegap | 2.2.0 | |
adobe | phonegap | 2.2.0 | |
adobe | phonegap | 2.3.0 | |
adobe | phonegap | 2.3.0 | |
adobe | phonegap | 2.3.0 | |
adobe | phonegap | 2.4.0 | |
adobe | phonegap | 2.4.0 | |
adobe | phonegap | 2.5.0 | |
adobe | phonegap | 2.5.0 | |
adobe | phonegap | 2.6.0 | |
adobe | phonegap | 2.6.0 | |
adobe | phonegap | 2.7.0 | |
adobe | phonegap | 2.7.0 | |
adobe | phonegap | 2.8.0 | |
adobe | phonegap | 2.8.1 | |
adobe | phonegap | 2.9.0 | |
microsoft | windows_phone | 7 | |
microsoft | windows_phone | 8 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:cordova:*:*:*:*:*:*:*:*", "matchCriteriaId": "66A5703F-E43E-4F18-AC7B-534761942DCC", "versionEndIncluding": "3.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:cordova:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "74BBFE10-2CB5-446D-9D83-E5C39F6F47C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:cordova:3.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "273742B5-559F-4BC5-994E-D559D4008108", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:cordova:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D2A0ACB-2E9C-4639-8C9B-4F0004C8DF9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:cordova:3.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "F8A468C2-55F1-4C6C-A547-D7E5B68EABC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:cordova:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C93B210-E664-447B-8859-0432CE8D4F00", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:cordova:3.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D8F8721A-3968-438A-967D-B8B911F73CB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:cordova:3.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CE1A4A77-DC7F-4C97-A7FC-5BF7E73D5DB6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_phone:7:*:*:*:*:*:*:*", "matchCriteriaId": "9CF422A0-389C-4C86-9A9D-5917F7F34E6C", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_phone:8:*:*:*:*:*:*:*", "matchCriteriaId": "2BDA3A48-1527-4B8F-AE9E-9D405CC7D253", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:phonegap:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE71EC19-A23D-45B1-984B-DDD27A3DF2F8", "versionEndIncluding": "2.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:phonegap:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D3B05BE6-D8DA-40C8-BA86-67B1FD906975", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:phonegap:2.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "C57DD500-22A7-4209-AEF7-DC8930F1BDD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:phonegap:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "16EC33AF-5D22-418D-8604-EB549A197209", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:phonegap:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "6C8124E0-6A2F-493E-875E-1D0E613A366B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:phonegap:2.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "D6D5BDFF-A635-45D6-A346-754BFACD00A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:phonegap:2.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "0A0B3637-4927-47AD-87A0-EE411C12EE06", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:phonegap:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "B6451A3E-BEB0-4EE0-AD88-8CE3E048CB10", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:phonegap:2.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "EBEEDD73-74C5-4299-8509-324A829623D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:phonegap:2.3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "0BC85762-A07D-4C44-8458-08FC2F717462", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:phonegap:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "9C19E85E-6E96-4F24-8A10-393B9DB1770F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:phonegap:2.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CA489695-A354-4921-903F-65AD650BCB61", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:phonegap:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "2B534832-D498-4881-AC3D-342FE50FC405", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:phonegap:2.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "4C20AC3F-8A9D-4450-AB38-2FC4A19605F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:phonegap:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "7121F63A-3A8E-458F-87F2-DFA5A16802AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:phonegap:2.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "DC93C958-7FBC-427E-89E4-C84B97471EFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:phonegap:2.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "F81B0017-2BF3-4315-BFF5-B7CD5DF98A60", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:phonegap:2.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "7535E5BD-A4F0-45B9-BA79-8FE2783A58D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:phonegap:2.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "DFDC0304-7948-41DF-A330-1773E3B6336B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:phonegap:2.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "695CDE63-FDA3-4EDC-8D1E-D8921CCD3B54", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:phonegap:2.9.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "F500CA59-28E5-4EC0-B698-2A26DD4BCC46", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_phone:7:*:*:*:*:*:*:*", "matchCriteriaId": "9CF422A0-389C-4C86-9A9D-5917F7F34E6C", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_phone:8:*:*:*:*:*:*:*", "matchCriteriaId": "2BDA3A48-1527-4B8F-AE9E-9D405CC7D253", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Cordova 3.3.0 and earlier and Adobe PhoneGap 2.9.0 and earlier on Windows Phone 7 and 8 do not properly restrict navigation events, which allows remote attackers to bypass intended device-resource restrictions via content that is accessed (1) in an IFRAME element or (2) with the XMLHttpRequest method by a crafted application." }, { "lang": "es", "value": "Apache Cordova 3.3.0 y anteriores y Adobe PhoneGap 2.9.0 y anteriores en Windows Phone 7 y 8 no restringen debidamente eventos de navegaci\u00f3n, lo que permite a atacantes remotos evadir restricciones \"device-resource\" a trav\u00e9s de contenido que es accedido (1) en un elemento IFRAME o (2) con el m\u00e9todo XMLHttpRequest mediante una aplicaci\u00f3n manipulada." } ], "id": "CVE-2014-1884", "lastModified": "2024-11-21T02:05:12.360", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-03-03T04:50:46.343", "references": [ { "source": "cve@mitre.org", "url": "http://openwall.com/lists/oss-security/2014/02/07/9" }, { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/124954/apachecordovaphonegap-bypass.txt" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://seclists.org/bugtraq/2014/Jan/96" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf" }, { "source": "cve@mitre.org", "url": "http://www.internetsociety.org/ndss2014/programme#session3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2014/02/07/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/124954/apachecordovaphonegap-bypass.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://seclists.org/bugtraq/2014/Jan/96" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.internetsociety.org/ndss2014/programme#session3" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.