CVE-2014-0073
high-risk
Published 2017-10-30
The CDVInAppBrowser class in the Apache Cordova In-App-Browser standalone plugin (org.apache.cordova.inappbrowser) before 0.3.2 for iOS and the In-App-Browser plugin for iOS from Cordova 2.6.0 through 2.9.0 does not properly validate callback identifiers, which allows remote attackers to execute arbitrary JavaScript in the host page and consequently gain privileges via a crafted gap-iab: URI.
Do I need to act?
!
11.4% chance of exploitation in next 30 days
EPSS score — higher than 89% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (2)
Affected Vendors
References (14)
Issue Tracking
http://d3adend.org/blog/?p=403
Mailing List
http://seclists.org/fulldisclosure/2014/Mar/30
Third Party Advisory
http://www.securityfocus.com/bid/65959
Issue Tracking
https://exchange.xforce.ibmcloud.com/vulnerabilities/91560
Issue Tracking
http://d3adend.org/blog/?p=403
Mailing List
http://seclists.org/fulldisclosure/2014/Mar/30
Third Party Advisory
http://www.securityfocus.com/bid/65959
Issue Tracking
https://exchange.xforce.ibmcloud.com/vulnerabilities/91560
50
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
11/34 · Low
Exposure
7/34 · Low