2024-12-08 03:06:42 +00:00

288 lines
10 KiB
JSON

{
"id": "CVE-2012-6637",
"sourceIdentifier": "cve@mitre.org",
"published": "2014-03-03T04:50:46.203",
"lastModified": "2024-11-21T01:46:34.943",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Apache Cordova 3.3.0 and earlier and Adobe PhoneGap 2.9.0 and earlier do not anchor the end of domain-name regular expressions, which allows remote attackers to bypass a whitelist protection mechanism via a domain name that contains an acceptable name as an initial substring."
},
{
"lang": "es",
"value": "Apache Cordova 3.3.0 y anteriores y Adobe PhoneGap 2.9.0 y anteriores no identifican las expresiones regulares del final de un nombre de dominio, lo que permite a atacantes remotos evadir un mecanismo de protecci\u00f3n de lista blanca a trav\u00e9s de un nombre de dominio que contiene un nombre aceptable como subcadena inicial."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:cordova:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.3.0",
"matchCriteriaId": "66A5703F-E43E-4F18-AC7B-534761942DCC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:cordova:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "74BBFE10-2CB5-446D-9D83-E5C39F6F47C6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:cordova:3.0.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "273742B5-559F-4BC5-994E-D559D4008108"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:cordova:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6D2A0ACB-2E9C-4639-8C9B-4F0004C8DF9E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:cordova:3.1.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "F8A468C2-55F1-4C6C-A547-D7E5B68EABC2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:cordova:3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1C93B210-E664-447B-8859-0432CE8D4F00"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:cordova:3.2.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D8F8721A-3968-438A-967D-B8B911F73CB1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:cordova:3.3.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "CE1A4A77-DC7F-4C97-A7FC-5BF7E73D5DB6"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:phonegap:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.9.0",
"matchCriteriaId": "AE71EC19-A23D-45B1-984B-DDD27A3DF2F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:phonegap:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D3B05BE6-D8DA-40C8-BA86-67B1FD906975"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:phonegap:2.0.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "C57DD500-22A7-4209-AEF7-DC8930F1BDD9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:phonegap:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16EC33AF-5D22-418D-8604-EB549A197209"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:phonegap:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6C8124E0-6A2F-493E-875E-1D0E613A366B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:phonegap:2.2.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D6D5BDFF-A635-45D6-A346-754BFACD00A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:phonegap:2.2.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "0A0B3637-4927-47AD-87A0-EE411C12EE06"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:phonegap:2.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B6451A3E-BEB0-4EE0-AD88-8CE3E048CB10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:phonegap:2.3.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "EBEEDD73-74C5-4299-8509-324A829623D8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:phonegap:2.3.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "0BC85762-A07D-4C44-8458-08FC2F717462"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:phonegap:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9C19E85E-6E96-4F24-8A10-393B9DB1770F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:phonegap:2.4.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "CA489695-A354-4921-903F-65AD650BCB61"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:phonegap:2.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2B534832-D498-4881-AC3D-342FE50FC405"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:phonegap:2.5.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "4C20AC3F-8A9D-4450-AB38-2FC4A19605F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:phonegap:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7121F63A-3A8E-458F-87F2-DFA5A16802AD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:phonegap:2.6.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "DC93C958-7FBC-427E-89E4-C84B97471EFB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:phonegap:2.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F81B0017-2BF3-4315-BFF5-B7CD5DF98A60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:phonegap:2.7.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7535E5BD-A4F0-45B9-BA79-8FE2783A58D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:phonegap:2.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DFDC0304-7948-41DF-A330-1773E3B6336B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:phonegap:2.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "695CDE63-FDA3-4EDC-8D1E-D8921CCD3B54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:phonegap:2.9.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "F500CA59-28E5-4EC0-B698-2A26DD4BCC46"
}
]
}
]
}
],
"references": [
{
"url": "http://labs.mwrinfosecurity.com/blog/2012/04/30/building-android-javajavascript-bridges/",
"source": "cve@mitre.org"
},
{
"url": "http://openwall.com/lists/oss-security/2014/02/07/9",
"source": "cve@mitre.org"
},
{
"url": "http://packetstormsecurity.com/files/124954/apachecordovaphonegap-bypass.txt",
"source": "cve@mitre.org"
},
{
"url": "http://seclists.org/bugtraq/2014/Jan/96",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.internetsociety.org/ndss2014/programme#session3",
"source": "cve@mitre.org"
},
{
"url": "http://labs.mwrinfosecurity.com/blog/2012/04/30/building-android-javajavascript-bridges/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://openwall.com/lists/oss-security/2014/02/07/9",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://packetstormsecurity.com/files/124954/apachecordovaphonegap-bypass.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://seclists.org/bugtraq/2014/Jan/96",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "http://www.internetsociety.org/ndss2014/programme#session3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}