You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@cordova.apache.org by "Joe Bowser (Created) (JIRA)" <ji...@apache.org> on 2012/03/16 00:14:37 UTC
[jira] [Created] (CB-343) FileTransfer Download does NOT respect
WhiteList
FileTransfer Download does NOT respect WhiteList
------------------------------------------------
Key: CB-343
URL: https://issues.apache.org/jira/browse/CB-343
Project: Apache Callback
Issue Type: Bug
Components: Android
Affects Versions: 1.5.0
Reporter: Joe Bowser
Assignee: Joe Bowser
Priority: Blocker
Fix For: 1.6.0
Steps to reproduce:
1. Use Download API Example to download from a site not on the whitelist
Expected:
This should fail
What happens:
This works! The URL isn't checked against the whitelist. This allows for any 3rd-Party Javascript to be pulled onto the local FS and then executed from arbitrary domains.
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators: https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira
[jira] [Resolved] (CB-343) FileTransfer Download does NOT respect
WhiteList
Posted by "Joe Bowser (Resolved) (JIRA)" <ji...@apache.org>.
[ https://issues.apache.org/jira/browse/CB-343?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Joe Bowser resolved CB-343.
---------------------------
Resolution: Fixed
Fixed! This now checks the whitelist. Added the isUrlWhitelisted to the CordovaInterface.
> FileTransfer Download does NOT respect WhiteList
> ------------------------------------------------
>
> Key: CB-343
> URL: https://issues.apache.org/jira/browse/CB-343
> Project: Apache Callback
> Issue Type: Bug
> Components: Android
> Affects Versions: 1.5.0
> Reporter: Joe Bowser
> Assignee: Joe Bowser
> Priority: Blocker
> Fix For: 1.6.0
>
>
> Steps to reproduce:
> 1. Use Download API Example to download from a site not on the whitelist
> Expected:
> This should fail
> What happens:
> This works! The URL isn't checked against the whitelist. This allows for any 3rd-Party Javascript to be pulled onto the local FS and then executed from arbitrary domains.
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators: https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira