Android Apache Cordova File Transfer Plugin HTTP Header Injection Vulnerability Fixed by 1.3.0


Description   (:An HTTP header injection vulnerability has been identified in the Apache Cordova File Transfert plugin for Android.:A remote attacker could exploit it in order to inject arbitrary HTML or script in the context of its victim by enticing her to download a specially crafted file.::This vulnerability is due to a lack of verification of the file's name.)
     
Vulnerable Products   Vulnerable Software:
Cordova (Apache Software Foundation) - 1.0, 1.2.1Worklight (IBM) - 5.0.x, 6.x
     
Solution   IBM has released interim fixes via APAR PI47658 for Worklight in order to fix this vulnerability.
     
CVE   CVE-2015-5204
     
References   - oss-sec : HTTP header injection vulnerability in Apache Cordova File Transfer Plugin for Android
http://seclists.org/oss-sec/2015/q3/618
- IBM : Vulnerability in Apache Cordova affects IBM Worklight, IBM Mobile Foundation and IBM MobileFirst Platform Foundation (CVE-2015-5204)
http://www-01.ibm.com/support/docview.wss?uid=swg21971225
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
HTTP Request Smuggling : HTTP command found in header
3.2.0
HTTP Request Smuggling : Content-Length and Transfer-Encoding: chunked fields in header
3.2.0
HTTP Request Smuggling : suspicious syntax using HTTP keyword
3.2.0
HTTP Request Smuggling : multiple Content-Length fields
3.2.0
     


 
 
 
 
 Risk level 
Moderate 

 Vulnerability First Public Report Date 
2015-09-22 

 Target Type 
Server 

 Possible exploit 
Remote