Apache Cordova Android 5.2.2 Information Leak

2017.05.11
Credit: Mark Ward
Risk: High
Local: No
Remote: Yes
CWE: N/A


Ogólna skala CVSS: 5/10
Znaczenie: 2.9/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Brak
Wpływ na dostępność: Brak

CVE-2016-6799: Internal system information leak Severity: High Vendor: The Apache Software Foundation Versions Affected: Cordova Android (5.2.2 and below) Description: The application calls methods of the Log class. Messages passed to these methods (Log.v(), Log.d(), Log.i(), Log.w(), and Log.e()) are stored in a series of circular buffers on the device. By default, a maximum of four 16 KB rotated logs are kept in addition to the current log. The logged data can be read using Logcat on the device. When using platforms prior to Android 4.1 (Jelly Bean), the log data is not sandboxed per applicationI3/4 any application installed on the device has the capability to read data logged by other applications. Upgrade path: Developers who are concerned about this issue should upgrade to 6.0.0 or later and install cordova plugins whose versions are equal to or greater than: cordova-plugin-battery-status: 1.2.0 cordova-plugin-camera: 2.3.0 cordova-plugin-console: 1.0.4 cordova-plugin-contacts: 2.2.0 cordova-plugin-device: 1.1.3 cordova-plugin-device-motion: 1.2.2 cordova-plugin-device-orientation: 1.0.4 cordova-plugin-dialogs: 1.3.0 cordova-plugin-file: 4.3.0 cordova-plugin-file-transfer: 1.6.0 cordova-plugin-geolocation: 2.3.0 cordova-plugin-globalization: 1.0.4 cordova-plugin-inappbrowser: 1.5.0 cordova-plugin-media: 2.4.0 cordova-plugin-media-capture: 1.4.0 cordova-plugin-network-information: 1.3.0 cordova-plugin-splashscreen: 4.0.0 cordova-plugin-statusbar: 2.2.0 cordova-plugin-test-framework: 1.1.3 cordova-plugin-vibration: 2.1.2 cordova-plugin-whitelist: 1.3.0 cordova-plugin-wkwebview-engine: 1.1.0 Mitigation Steps: If developers are unable to install the latest versions, this vulnerability can easily be mitigated by not putting sensitive information in the log statements. Credit: Mark Ward


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top