CVE-2014-1881

Apache Cordova 3.3.0 and earlier and Adobe PhoneGap 2.9.0 and earlier allow remote attackers to bypass intended device-resource restrictions of an event-based bridge via a crafted library clone that leverages IFRAME script execution and waits a certain amount of time for an OnJsPrompt handler return value as an alternative to correct synchronization.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:cordova:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:cordova:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:cordova:3.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:apache:cordova:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:cordova:3.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:apache:cordova:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:cordova:3.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:apache:cordova:3.3.0:rc1:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:adobe:phonegap:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:phonegap:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:phonegap:2.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:adobe:phonegap:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:phonegap:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:phonegap:2.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:adobe:phonegap:2.2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:adobe:phonegap:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:phonegap:2.3.0:rc1:*:*:*:*:*:*
cpe:2.3:a:adobe:phonegap:2.3.0:rc2:*:*:*:*:*:*
cpe:2.3:a:adobe:phonegap:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:phonegap:2.4.0:rc1:*:*:*:*:*:*
cpe:2.3:a:adobe:phonegap:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:phonegap:2.5.0:rc1:*:*:*:*:*:*
cpe:2.3:a:adobe:phonegap:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:phonegap:2.6.0:rc1:*:*:*:*:*:*
cpe:2.3:a:adobe:phonegap:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:phonegap:2.7.0:rc1:*:*:*:*:*:*
cpe:2.3:a:adobe:phonegap:2.8.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:phonegap:2.8.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:phonegap:2.9.0:rc1:*:*:*:*:*:*

History

No history.

Information

Published : 2014-03-03 04:50

Updated : 2023-12-10 11:31


NVD link : CVE-2014-1881

Mitre link : CVE-2014-1881

CVE.ORG link : CVE-2014-1881


JSON object : View

Products Affected

apache

  • cordova

adobe

  • phonegap
CWE
CWE-264

Permissions, Privileges, and Access Controls