First published: Mon Oct 30 2017(Updated: )
ios/CDVFileTransfer.m in the Apache Cordova File-Transfer standalone plugin (org.apache.cordova.file-transfer) before 0.4.2 for iOS and the File-Transfer plugin for iOS from Cordova 2.4.0 through 2.9.0 might allow remote attackers to spoof SSL servers by leveraging a default value of true for the trustAllHosts option.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Cordova File Transfer iphone os | <=0.4.1 | |
Apache Cordova iOS | >=2.4.0<=2.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0072 is considered to be of medium severity due to the potential for SSL server spoofing.
To fix CVE-2014-0072, update the Apache Cordova File Transfer plugin to version 0.4.2 or later.
CVE-2014-0072 affects Apache Cordova File Transfer before version 0.4.2 and Cordova versions 2.4.0 through 2.9.0.
CVE-2014-0072 allows remote attackers to spoof SSL servers, potentially leading to data interception or manipulation.
CVE-2014-0072 is primarily exploitable in environments using affected versions of the Cordova File Transfer plugin for iOS.