First published: Tue Jan 14 2020(Updated: )
A website running in the InAppBrowser webview on Android could execute arbitrary JavaScript in the main application's webview using a specially crafted gap-iab: URI.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Cordova Inappbrowser | <=3.0.0 | |
Oracle Instantis Enterprisetrack | =17.1 | |
Oracle Instantis Enterprisetrack | =17.2 | |
Oracle Instantis Enterprisetrack | =17.3 | |
Oracle Retail Xstore Point of Service | =16.0.6 | |
Oracle Retail Xstore Point of Service | =17.0.4 | |
Oracle Retail Xstore Point of Service | =18.0.3 | |
Oracle Retail Xstore Point of Service | =19.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-0219 is a vulnerability that allows a website running in the InAppBrowser webview on Android to execute arbitrary JavaScript in the main application's webview using a specially crafted gap-iab: URI.
The Apache Cordova Inappbrowser, Oracle Instantis Enterprisetrack (version 17.1, 17.2, 17.3), and Oracle Retail Xstore Point of Service (version 16.0.6, 17.0.4, 18.0.3, 19.0.2) are affected by CVE-2019-0219.
CVE-2019-0219 has a severity rating of 9.8 (critical).
To fix CVE-2019-0219, update the affected software to a version that has addressed the vulnerability.
You can find more information about CVE-2019-0219 at the following references: [1] http://www.openwall.com/lists/oss-security/2019/11/28/1, [2] https://lists.apache.org/thread.html/197482d5ab80c0bff4a5ec16e1b0466df38389d9a4b5331d777f14fc%40%3Cdev.cordova.apache.org%3E, [3] https://lists.apache.org/thread/4vtg0trdrh5203dktt4f3vkd5z2d5ndj