Description
ios/CDVFileTransfer.m in the Apache Cordova File-Transfer standalone plugin (org.apache.cordova.file-transfer) before 0.4.2 for iOS and the File-Transfer plugin for iOS from Cordova 2.4.0 through 2.9.0 might allow remote attackers to spoof SSL servers by leveraging a default value of true for the trustAllHosts option.
Remediation
References
http://d3adend.org/blog/?p=403
http://seclists.org/fulldisclosure/2014/Mar/29
http://www.securityfocus.com/archive/1/531335/100/0/threaded
https://exchange.xforce.ibmcloud.com/vulnerabilities/91561
https://github.com/apache/cordova-plugin-file-transfer/commit/a1d6fc07e8a40c1b2b16f4103c403b30e1089668
https://mail-archives.apache.org/mod_mbox/cordova-dev/201403.mbox/%3CCAK_TSXKL9JtkehHC0jEoRwdvVKXt-d5uj40EwNY-Gk3ttX=wJw%40mail.gmail.com%3E
Related Vulnerabilities
CVE-2022-21803 Vulnerability in maven package org.webjars.npm:nconf
CVE-2021-3690 Vulnerability in maven package io.undertow:undertow-core
CVE-2020-28426 Vulnerability in npm package kill-process-on-port
CVE-2023-26487 Vulnerability in npm package vega
CVE-2022-40152 Vulnerability in maven package com.fasterxml.woodstox:woodstox-core