• Home
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
  • Events
  • Whitepapers
  • SMB Spotlight
  • Newsletters
  • Sign in
  • Events
    • Upcoming events
      event logo
      Big Data Virtual Summit

      The Big Data Virtual Summit will comprise expert keynotes, real world case studies and interactive discussion panels led by senior IT practitioners who will share their tips for Big Data technologies and data management strategies.

      • Date: 19 Oct 2016
      • Online
      View all events
      Follow V3 Events

      Sign up to receive email alerts about our events

      Sign up
  • Whitepapers
    • V3-resources-120x194
      Leveraging data for small businesses

      The most successful businesses are those with confidence in their ability to store, access and use data effectively.  Rather than focusing on the nuts and bolts of storage, this view point looks at the data it holds and more importantly, what can be done with it.

      Download
      V3-resources-120x194
      Getting the SMB network just right

      This review looks at why small businesses need to stop being complacent about their networks and at what they can do to maintain their competitive edge as they follow the big boys down the route of increasing collaboration and other bandwidth-hungry applications likely to impact on network performance and availability.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • SMB Spotlight
  • Sign in
  •  
    •  

      Personalise your on site experience

      Download and use the apps

      Access your subscription from outside of the office

      Get relevant news and insight straight to your inbox

      Forgot your password?
     
     
      • Saved articles
      • Newsletters
      • Apps
      • Account details
      • Contact support
      • Sign out
     
  • Follow us
    • RSS
    • Twitter
    • Newsletters
    • Facebook
    • YouTube
    • Apps
  • Register
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
 
  •  

    Personalise your on site experience

    Download and use the apps

    Access your subscription from outside of the office

    Get relevant news and insight straight to your inbox

    Forgot your password?
 
 
    • Saved articles
    • Newsletters
    • Apps
    • Account details
    • Contact support
    • Sign out
 
V3.co.uk
  • Security

Apache Cordova flaw leaves one in 20 Android apps open to attack

Exploitation could let crooks crash and tamper with app's behaviour, according to Trend Micro

Android logo
Apache flaw found in Android apps
  • Alastair Stevenson
  • Alastair Stevenson
  • @MonkeyGuru
  • 28 May 2015
  • Tweet  
  • Facebook  
  •  
  •  
  • Save this article  
  • Send to  
0 Comments

Researchers at Trend Micro have uncovered a flaw in the Apache Cordova  mobile API framework used by one in 20 Android applications, which could be exploited remotely by hackers.

Trend Micro mobile threats analyst Seven Shen reported uncovering the flaw in a threat advisory.

"We've discovered a vulnerability in the Apache Cordova app framework that allows attackers to modify the behaviour of apps just by clicking a URL," read the advisory.

"Designated as CVE-2015-1835, this high-severity vulnerability affects all versions of Apache Cordova up to 4.0.1. Apache has released a security bulletin confirming the vulnerability.

"This means that the majority of Cordova-based apps, which accounts for 5.6 percent of all apps in Google Play, are prone to exploits."

The bug reportedly stems from a flaw in the way the framework handles app developer preferences.

"The vulnerability is found in a Cordova feature where secondary configuration variables (also known as 'preferences') could be set from intent bundles in the base activity," explained the Trend Micro advisory.

"Preferences are a set of variables reserved for developers to configure their apps. They are the sources of the build-in characteristics of Cordova-based apps and should be controlled only by app developers.

"Any tampering with these variables during runtime initialisation will certainly mess up the app's normal behaviour."

The flaw can reportedly be exploited for a variety of purposes, including tampering with the UI's appearance, injecting pop-ups, texts and splash screens, modifying basic functionalities and crashing the app.

Trend Micro has already published proof-of-concept attacks targeting the flaw.

The firm said that it has alerted Apache to the flaw, but urged developers to manually adjust the preferences for their applications ahead of a full fix.

"We privately disclosed this vulnerability to Apache, and they have released an official bulletin," said Trend Micro.

"We suggest Android app developers upgrade their Cordova framework to the latest version (version 4.0.2) and rebuild to a new release. This will prevent apps from being modified by attackers targeting this vulnerability."

The Apache flaw is one of many recently uncovered mobile threats. Researchers at SourceDNA uncovered an AFNetworking SSL flaw in April in at least 25,000 iOS applications, leaving iPhone and iPad users open to man-in-the-middle attacks.

  • Tweet  
  • Facebook  
  •  
  •  
  • Save this article  
  • Send to  
  • Topics
  • Security
  • Mobile Software
  • Developer
  • Trend Micro
  • Hacking
  • Apps
  • Smartphones
  • Android

V3 Latest

credit-card
Oracle hack potentially compromises almost every US credit card

Oracle attackers possibly got unlimited control over credit cards, warns security firm ERPScan

  • Security
  • 09 August 2016
Vodafone logo
Vodafone 'ends line rental charges' for fibre broadband customers

Vodafone moves first in response to regulator pressure over broadband price clarity

  • Internet
  • 09 August 2016
Weather data on smartphone
Met Office drops Google App Engine for Microsoft Azure in IoT future proofing move

PaaS with Microsoft affordable and scalable, says CIO advisor

  • Cloud Computing
  • 09 August 2016
BlackBerry DTEK50
BlackBerry DTEK50 review

Can a dazzling security suite alone make for a good phone?

  • Mobile Phones
  • 09 August 2016
blog comments powered by Disqus
Back to Top

Most read

BlackBerry DTEK50
BlackBerry DTEK50 review
credit-card
Oracle hack potentially compromises almost every US credit card
Microsoft Windows XP boxes on the assembly line in 2001
27,000 Windows XP PCs still in use at Met Police
Oracle building
Russian Carbanak cyber crooks breach 700 internal Oracle systems
iPhone 7 Plus prototype spotted in video
iPhone 7 and 7 Plus to have dual-camera tech and new home button
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About Incisive Media
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • Newsletters
  • Facebook
  • YouTube
  • Apps

© Incisive Business Media Limited

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, Haymarket House, 28-29 Haymarket, London SW1Y 4RX, are companies registered in England and Wales with company registration numbers 9177174 & 9178013

Digital publisher of the year 2010, 2013 & 2016

Digital publisher of the year 2010, 2013 & 2016