{"containers":{"cna":{"affected":[{"product":"Apache Cordova Android","vendor":"Apache Software Foundation","versions":[{"status":"affected","version":"Apache Cordova 6.1.0 and below"}]}],"datePublic":"2017-01-27T00:00:00.000Z","descriptions":[{"lang":"en","value":"After the Android platform is added to Cordova the first time, or after a project is created using the build scripts, the scripts will fetch Gradle on the first build. However, since the default URI is not using https, it is vulnerable to a MiTM and the Gradle executable is not safe. The severity of this issue is high due to the fact that the build scripts immediately start a build after Gradle has been fetched. Developers who are concerned about this issue should install version 6.1.2 or higher of Cordova-Android. If developers are unable to install the latest version, this vulnerability can easily be mitigated by setting the CORDOVA_ANDROID_GRADLE_DISTRIBUTION_URL environment variable to https://services.gradle.org/distributions/gradle-2.14.1-all.zip"}],"problemTypes":[{"descriptions":[{"description":"Man-in-the-Middle vulnerability","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2020-04-15T21:06:41.000Z","orgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","shortName":"apache"},"references":[{"tags":["x_refsource_MISC"],"url":"https://cordova.apache.org/announcements/2017/01/27/android-612.html"},{"name":"95838","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/95838"},{"tags":["x_refsource_MISC"],"url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security@apache.org","DATE_PUBLIC":"2017-01-27T00:00:00","ID":"CVE-2017-3160","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Apache Cordova Android","version":{"version_data":[{"version_value":"Apache Cordova 6.1.0 and below"}]}}]},"vendor_name":"Apache Software Foundation"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"After the Android platform is added to Cordova the first time, or after a project is created using the build scripts, the scripts will fetch Gradle on the first build. However, since the default URI is not using https, it is vulnerable to a MiTM and the Gradle executable is not safe. The severity of this issue is high due to the fact that the build scripts immediately start a build after Gradle has been fetched. Developers who are concerned about this issue should install version 6.1.2 or higher of Cordova-Android. If developers are unable to install the latest version, this vulnerability can easily be mitigated by setting the CORDOVA_ANDROID_GRADLE_DISTRIBUTION_URL environment variable to https://services.gradle.org/distributions/gradle-2.14.1-all.zip"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Man-in-the-Middle vulnerability"}]}]},"references":{"reference_data":[{"name":"https://cordova.apache.org/announcements/2017/01/27/android-612.html","refsource":"MISC","url":"https://cordova.apache.org/announcements/2017/01/27/android-612.html"},{"name":"95838","refsource":"BID","url":"http://www.securityfocus.com/bid/95838"},{"name":"https://www.oracle.com/security-alerts/cpuapr2020.html","refsource":"MISC","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T14:16:28.311Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://cordova.apache.org/announcements/2017/01/27/android-612.html"},{"name":"95838","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/95838"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.oracle.com/security-alerts/cpuapr2020.html"}]}]},"cveMetadata":{"assignerOrgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","assignerShortName":"apache","cveId":"CVE-2017-3160","datePublished":"2018-02-01T21:00:00.000Z","dateReserved":"2016-12-05T00:00:00.000Z","dateUpdated":"2024-09-16T19:56:14.676Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}