Android applications built with the Cordova framework can launch other applications through the use of anchor tags, or by redirecting the webview to an Android intent URL. An attacker who can manipulate the HTML content of a Cordova application can create links which open other applications and send arbitrary data to those applications. An attacker who can run arbitrary JavaScript code within the context of the Cordova application can also set the document location to such a URL. By using this in concert with a second, vulnerable application, an attacker might be able to use this method to send data from the Cordova application to the network. This release is an update to a prior advisory.
4e0dda886cea833a687c664d12a4435708cfcce65b89f11c91f68124746cc7f1
Apache Cordova versions up to 3.5.0 suffer from information disclosure, whitelist bypass, and cross application issues.
b40574101ee277ded07c47ea5ed1519dd4879415cb724ee5af90126d1af3c686