Security Flaw in Android Build Scripts for Cordova by Apache
CVE-2017-3160

7.4HIGH

Key Information:

Vendor
Apache
Vendor
CVE Published:
1 February 2018

Summary

This vulnerability arises when the Cordova platform on Android fetches the Gradle executable from a non-secure HTTP URI during the initial build process. As a result, this opens the door to Man-in-the-Middle attacks, where an attacker could potentially intercept and compromise the Gradle distribution before it is used in the build. Developers are strongly encouraged to upgrade to Cordova-Android version 6.1.2 or later to ensure secure fetching of Gradle. As an immediate mitigation measure, developers can also configure the environment variable CORDOVA_ANDROID_GRADLE_DISTRIBUTION_URL to use a secure HTTPS link for fetching Gradle.

Affected Version(s)

Apache Cordova Android Apache Cordova 6.1.0 and below

References

CVSS V3.1

Score:
7.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.