Security Flaw in Android Build Scripts for Cordova by Apache
CVE-2017-3160
7.4HIGH
Summary
This vulnerability arises when the Cordova platform on Android fetches the Gradle executable from a non-secure HTTP URI during the initial build process. As a result, this opens the door to Man-in-the-Middle attacks, where an attacker could potentially intercept and compromise the Gradle distribution before it is used in the build. Developers are strongly encouraged to upgrade to Cordova-Android version 6.1.2 or later to ensure secure fetching of Gradle. As an immediate mitigation measure, developers can also configure the environment variable CORDOVA_ANDROID_GRADLE_DISTRIBUTION_URL to use a secure HTTPS link for fetching Gradle.
Affected Version(s)
Apache Cordova Android Apache Cordova 6.1.0 and below
References
CVSS V3.1
Score:
7.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved