Информационная безопасность
[RU] switch to English


Дополнительная информация

  Уязвимости безопасности в различных приложениях под iOS / Android

  Photos in Wifi v1.0.1 iOS - Arbitrary File Upload Vulnerability

  My.WiFi USB Drive v1.0 iOS - File Include Vulnerability

  WiFi Drive CR v1.0 iOS - Persistent Filename Dir List Vulnerability

  UDID v1.0 iOS - Persistent Mail Encode Vulnerability

From:APACHE
Date:25 октября 2015 г.
Subject:Re: CVE-2015-5204: HTTP header injection vulnerability in Apache Cordova File Transfer Plugin for Android



CVE-2015-5204: HTTP header injection vulnerability in Apache Cordova File
Transfer Plugin for Android

Severity:
Medium

Vendor:
The Apache Software Foundation

Versions Affected:
Cordova Android File Transfer Plugin  (1.2.1 and below)

Description:
Android applications built with the Cordova framework that use the File
Transfer Plugin can have the HTTP headers set by that plugin be manipulated
by the filename being uploaded.  This allows for for cookies to be forged
by the Cordova application, or for the file payload to be replaced in some
situations.  Remotely hosted applications and applications developed with
Cordova that allow the user to manually enter the filename are
especially vulnerable to this issue.

Upgrade path:
Developers who are concerned about this issue should install version 1.3.0
or higher of the Cordova File Transfer Plugin and rebuild their
applications.  This plugin now conforms with RFC-2616 and no longer allows
non-ASCII characters and control characters in header names or values.
Any non-ASCII characters will be removed from the header.  Developers
should be aware,
and encode these characters before adding the values to the header.

Credit:
This issue was discovered by Muneaki Nishimura (Sony Digital Network
Applications, Inc.)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород