Author: janpio
Date: Tue Sep 29 19:20:41 2020
New Revision: 1882136

URL: http://svn.apache.org/viewvc?rev=1882136&view=rev
Log:
Updated docs

Added:
    cordova/site/public/news/2020/09/29/
    cordova/site/public/news/2020/09/29/cve-2020-6506.html
Modified:
    cordova/site/public/blog/index.html
    
cordova/site/public/docs/en/dev/reference/cordova-plugin-inappbrowser/index.html
    cordova/site/public/feed.xml
    cordova/site/public/news/2020/09/18/camera-plugin-release.html
    cordova/site/public/sitemap.xml
    cordova/site/public/static/js/index.js

Modified: cordova/site/public/blog/index.html
URL: 
http://svn.apache.org/viewvc/cordova/site/public/blog/index.html?rev=1882136&r1=1882135&r2=1882136&view=diff
==============================================================================
--- cordova/site/public/blog/index.html (original)
+++ cordova/site/public/blog/index.html Tue Sep 29 19:20:41 2020
@@ -123,6 +123,76 @@
             
             <li>
                 <header>
+                    <div class="adorner" blogTime="Tue, 29 Sep 2020 00:00:00 
+0000"></div>
+                    <h2 class="title">
+                        <a href="/news/2020/09/29/cve-2020-6506.html">Security 
Advisory CVE-2020-6506</a>
+                    </h2>
+                    <div class="details">
+                        <span class="date">29 Sep 2020</span>
+                        - by
+                        <span class="author">
+                            
+                                Jesse MacFadyen
+                            
+                        </span>
+                        <a class="comment" 
href="/news/2020/09/29/cve-2020-6506.html#disqus_thread"></a>
+                    </div>
+                </header>
+                <section class="post-excerpt">
+                    <p><h1>Security Advisory CVE-2020-6506</h1>
+
+<h3>Formally Disclosed Advisory:</h3>
+
+<ul>
+<li>https://bugs.chromium.org/p/chromium/issues/detail?id=1083819</li>
+</ul>
+
+<p>This vulnerability is a universal cross-site scripting (UXSS) vulnerability 
in Android WebView which allows cross-origin iframes to execute arbitrary 
JavaScript in the top-level document.  Apache Cordova apps built for Android 
devices which allow the loading of http content from domains they do not 
control could be affected.  Theoretically this would be either in an iframe, or 
by use of the InAppBrowser plugin (cordova-plugin-inappbrowser).</p>
+
+<p>If your app loads a local page (e.g. index.html within Cordova app loads 
iframe from <a href="#">malicious-example.com</a>), no user interaction is 
required for this exploit.</p>
+
+<p>This vulnerability has been fixed in Android WebView as of version 
83.0.4103.106.
+Users must update their Android WebView from the Google Play Store 
themselves.</p>
+
+<h3>Mitigation</h3>
+
+<p>There are precautions you can take to avoid this vulnerability.</p>
+
+<ol>
+<li>Use a restrictive an allow-list and content security policy (CSP) as 
possible.<br>
+
+<ul>
+<li>https://cordova.apache.org/docs/en/latest/reference/cordova-plugin-whitelist/</li>
+<li>Ensure CSPs do not include &#39;unsafe-line&#39; for 
script-src/default-src unless necessary.</li>
+</ul></li>
+<li>Generally, always load local code into your application&#39;s main 
webview, and use InAppBrowser to display anything remote.
+
+<ul>
+<li>Always load untrusted content into an external browser (i.e. call 
InAppBrowser with <code>_system</code>)</li>
+<li>https://cordova.apache.org/docs/en/latest/reference/cordova-plugin-inappbrowser/</li>
+</ul></li>
+<li><p>Do not use iframes, and if you must, never do so in your 
application&#39;s main webview. Using the <code>sandbox</code> attribute will 
mitigate this vulnerability ( preferably with an empty value. ) Avoid using 
these sandbox attributes together <code>allow-popups allow-top-navigation 
allow-scripts</code> because they do NOT mitigate this vulnerability.</p>
+<div class="highlight"><pre><code class="language-js" data-lang="js"><span 
class="o">&lt;</span><span class="nx">iframe</span> <span 
class="nx">sandbox</span><span class="o">=</span><span class="s1">''</span> 
<span class="nx">src</span><span class="o">=</span><span 
class="s1">'http://untrusted-source'</span> <span class="o">/&gt;</span>
+</code></pre></div></li>
+</ol>
+
+<p>Most of these precautions have always been gentle recommendations of Apache 
Cordova, but were not reflected in the default values which were typically left 
open. The Apache Cordova committers are investigating preventing this 
vulnerability at the framework level, as well as tightening the default values 
to prevent inadvertant exposure. In the meantime, if you suspect your app is 
vulnerable, please follow the precautions above.</p>
+
+<p>Credit ( and thanks ) go to Alesandro Ortiz for discovering this 
vulnerability and bringing it to our attention.</p>
+
+<h3>Additional References</h3>
+
+<ul>
+<li>https://alesandroortiz.com/articles/uxss-android-webview-cve-2020-6506/</li>
+<li>https://nvd.nist.gov/vuln/detail/CVE-2020-6506</li>
+</ul>
+</p>
+                    <div><a 
href="/news/2020/09/29/cve-2020-6506.html">More...</a></div>
+                </section>
+            </li>
+            
+            <li>
+                <header>
                     <div class="adorner" blogTime="Fri, 18 Sep 2020 00:00:00 
+0000"></div>
                     <h2 class="title">
                         <a 
href="/news/2020/09/18/camera-plugin-release.html">Camera Plugin Released!</a>
@@ -10049,7 +10119,7 @@ window.twttr = (function(d, s, id) {
 <script>
     window.onload = function(){
         setTimeout(function(){
-            var lastPostTime = new Date("Fri, 18 Sep 2020 00:00:00 
+0000").getTime();
+            var lastPostTime = new Date("Tue, 29 Sep 2020 00:00:00 
+0000").getTime();
           setCookie("visitTime", lastPostTime, 365);
         }, 2000);
     };

Modified: 
cordova/site/public/docs/en/dev/reference/cordova-plugin-inappbrowser/index.html
URL: 
http://svn.apache.org/viewvc/cordova/site/public/docs/en/dev/reference/cordova-plugin-inappbrowser/index.html?rev=1882136&r1=1882135&r2=1882136&view=diff
==============================================================================
--- 
cordova/site/public/docs/en/dev/reference/cordova-plugin-inappbrowser/index.html
 (original)
+++ 
cordova/site/public/docs/en/dev/reference/cordova-plugin-inappbrowser/index.html
 Tue Sep 29 19:20:41 2020
@@ -2738,6 +2738,13 @@ var ref2 = cordova.InAppBrowser.open(enc
 
 <p><code>_blank</code> and <code>_self</code> targets are not yet implemented 
and are ignored silently. Pull requests and patches to get these to work are 
greatly appreciated.</p>
 
+<h3>iOS Quirks</h3>
+
+<p>Since the introduction of iPadOS 13, iPads try to adapt their content mode 
/ user agent for the optimal browsing experience. This may result in iPads 
having their user agent set to Macintosh, making it hard to detect them as 
mobile devices using user agent string sniffing. You can change this with the 
<code>PreferredContentMode</code> preference in <code>config.xml</code>.</p>
+<div class="highlight"><pre><code class="language-xml" data-lang="xml"><span 
class="nt">&lt;preference</span> <span class="na">name=</span><span 
class="s">"PreferredContentMode"</span> <span class="na">value=</span><span 
class="s">"mobile"</span> <span class="nt">/&gt;</span>
+</code></pre></div>
+<p>The example above forces the user agent to contain <code>iPad</code>. The 
other option is to use the value <code>desktop</code> to turn the user agent to 
<code>Macintosh</code>.</p>
+
 <h3>Browser Quirks</h3>
 
 <ul>

Modified: cordova/site/public/feed.xml
URL: 
http://svn.apache.org/viewvc/cordova/site/public/feed.xml?rev=1882136&r1=1882135&r2=1882136&view=diff
==============================================================================
--- cordova/site/public/feed.xml (original)
+++ cordova/site/public/feed.xml Tue Sep 29 19:20:41 2020
@@ -6,11 +6,74 @@
 </description>
     <link>https://cordova.apache.org/</link>
     <atom:link href="https://cordova.apache.org/feed.xml"; rel="self" 
type="application/rss+xml"/>
-    <pubDate>Fri, 18 Sep 2020 08:45:02 +0000</pubDate>
-    <lastBuildDate>Fri, 18 Sep 2020 08:45:02 +0000</lastBuildDate>
+    <pubDate>Tue, 29 Sep 2020 19:01:29 +0000</pubDate>
+    <lastBuildDate>Tue, 29 Sep 2020 19:01:29 +0000</lastBuildDate>
     <generator>Jekyll v2.5.3</generator>
     
       <item>
+        <title>Security Advisory CVE-2020-6506</title>
+        <description>&lt;h1&gt;Security Advisory CVE-2020-6506&lt;/h1&gt;
+
+&lt;h3&gt;Formally Disclosed Advisory:&lt;/h3&gt;
+
+&lt;ul&gt;
+&lt;li&gt;https://bugs.chromium.org/p/chromium/issues/detail?id=1083819&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;p&gt;This vulnerability is a universal cross-site scripting (UXSS) 
vulnerability in Android WebView which allows cross-origin iframes to execute 
arbitrary JavaScript in the top-level document.  Apache Cordova apps built for 
Android devices which allow the loading of http content from domains they do 
not control could be affected.  Theoretically this would be either in an 
iframe, or by use of the InAppBrowser plugin 
(cordova-plugin-inappbrowser).&lt;/p&gt;
+
+&lt;p&gt;If your app loads a local page (e.g. index.html within Cordova app 
loads iframe from &lt;a href=&quot;#&quot;&gt;malicious-example.com&lt;/a&gt;), 
no user interaction is required for this exploit.&lt;/p&gt;
+
+&lt;p&gt;This vulnerability has been fixed in Android WebView as of version 
83.0.4103.106.
+Users must update their Android WebView from the Google Play Store 
themselves.&lt;/p&gt;
+
+&lt;h3&gt;Mitigation&lt;/h3&gt;
+
+&lt;p&gt;There are precautions you can take to avoid this 
vulnerability.&lt;/p&gt;
+
+&lt;ol&gt;
+&lt;li&gt;Use a restrictive an allow-list and content security policy (CSP) as 
possible.&lt;br&gt;
+
+&lt;ul&gt;
+&lt;li&gt;https://cordova.apache.org/docs/en/latest/reference/cordova-plugin-whitelist/&lt;/li&gt;
+&lt;li&gt;Ensure CSPs do not include &amp;#39;unsafe-line&amp;#39; for 
script-src/default-src unless necessary.&lt;/li&gt;
+&lt;/ul&gt;&lt;/li&gt;
+&lt;li&gt;Generally, always load local code into your application&amp;#39;s 
main webview, and use InAppBrowser to display anything remote.
+
+&lt;ul&gt;
+&lt;li&gt;Always load untrusted content into an external browser (i.e. call 
InAppBrowser with &lt;code&gt;_system&lt;/code&gt;)&lt;/li&gt;
+&lt;li&gt;https://cordova.apache.org/docs/en/latest/reference/cordova-plugin-inappbrowser/&lt;/li&gt;
+&lt;/ul&gt;&lt;/li&gt;
+&lt;li&gt;&lt;p&gt;Do not use iframes, and if you must, never do so in your 
application&amp;#39;s main webview. Using the &lt;code&gt;sandbox&lt;/code&gt; 
attribute will mitigate this vulnerability ( preferably with an empty value. ) 
Avoid using these sandbox attributes together &lt;code&gt;allow-popups 
allow-top-navigation allow-scripts&lt;/code&gt; because they do NOT mitigate 
this vulnerability.&lt;/p&gt;
+&lt;div class=&quot;highlight&quot;&gt;&lt;pre&gt;&lt;code 
class=&quot;language-js&quot; data-lang=&quot;js&quot;&gt;&lt;span 
class=&quot;o&quot;&gt;&amp;lt;&lt;/span&gt;&lt;span 
class=&quot;nx&quot;&gt;iframe&lt;/span&gt; &lt;span 
class=&quot;nx&quot;&gt;sandbox&lt;/span&gt;&lt;span 
class=&quot;o&quot;&gt;=&lt;/span&gt;&lt;span 
class=&quot;s1&quot;&gt;&#39;&#39;&lt;/span&gt; &lt;span 
class=&quot;nx&quot;&gt;src&lt;/span&gt;&lt;span 
class=&quot;o&quot;&gt;=&lt;/span&gt;&lt;span 
class=&quot;s1&quot;&gt;&#39;http://untrusted-source&#39;&lt;/span&gt; &lt;span 
class=&quot;o&quot;&gt;/&amp;gt;&lt;/span&gt;
+&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/li&gt;
+&lt;/ol&gt;
+
+&lt;p&gt;Most of these precautions have always been gentle recommendations of 
Apache Cordova, but were not reflected in the default values which were 
typically left open. The Apache Cordova committers are investigating preventing 
this vulnerability at the framework level, as well as tightening the default 
values to prevent inadvertant exposure. In the meantime, if you suspect your 
app is vulnerable, please follow the precautions above.&lt;/p&gt;
+
+&lt;p&gt;Credit ( and thanks ) go to Alesandro Ortiz for discovering this 
vulnerability and bringing it to our attention.&lt;/p&gt;
+
+&lt;h3&gt;Additional References&lt;/h3&gt;
+
+&lt;ul&gt;
+&lt;li&gt;https://alesandroortiz.com/articles/uxss-android-webview-cve-2020-6506/&lt;/li&gt;
+&lt;li&gt;https://nvd.nist.gov/vuln/detail/CVE-2020-6506&lt;/li&gt;
+&lt;/ul&gt;
+</description>
+        <pubDate>Tue, 29 Sep 2020 00:00:00 +0000</pubDate>
+        
<link>https://cordova.apache.org/news/2020/09/29/cve-2020-6506.html</link>
+        <guid 
isPermaLink="true">https://cordova.apache.org/news/2020/09/29/cve-2020-6506.html</guid>
+        
+        <category>security</category>
+        
+        <category>advisory</category>
+        
+        
+        <category>news</category>
+        
+      </item>
+    
+      <item>
         <title>Camera Plugin Released!</title>
         <description>&lt;p&gt;We are happy to announce that we have just 
released an update to our camera plugin!&lt;/p&gt;
 
@@ -731,96 +794,6 @@ cordova platform add [email protected]
         
         <category>news</category>
         
-        <category>releases</category>
-        
-        
-        <category>announcements</category>
-        
-      </item>
-    
-      <item>
-        <title>Cordova iOS 6.1.0 Released!</title>
-        <description>&lt;p&gt;We are happy to announce that we have just 
released &lt;code&gt;Cordova iOS 6.1.0&lt;/code&gt;! This is Cordova&amp;#39;s 
official platform for building iOS mobile applications.&lt;/p&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;a 
href=&quot;https://www.npmjs.com/package/cordova-ios&quot;&gt;[email protected]&lt;/a&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;p&gt;&lt;strong&gt;To upgrade:&lt;/strong&gt;&lt;/p&gt;
-&lt;div class=&quot;highlight&quot;&gt;&lt;pre&gt;&lt;code 
class=&quot;language-bash&quot; data-lang=&quot;bash&quot;&gt;cordova platform 
remove ios
-cordova platform add [email protected]
-&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;
-&lt;h2&gt;Release Highlights&lt;/h2&gt;
-
-&lt;p&gt;This release contains primarily fixes for issues with the 6.0.0 
release.&lt;/p&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;&lt;strong&gt;Resolve CocoaPods publishing 
issues&lt;/strong&gt; &lt;em&gt;(since 6.0.0)&lt;/em&gt;&lt;/p&gt;
-
-&lt;p&gt;The Cordova iOS 6.0.0 release was unable to be published to CocoaPods 
due to issues with the Pod spec. These have been addressed and Cordova iOS 
6.1.0 is available.&lt;/p&gt;&lt;/li&gt;
-&lt;li&gt;&lt;p&gt;&lt;strong&gt;Fix landscape orientation 
defaults&lt;/strong&gt; &lt;em&gt;(since 6.0.0)&lt;/em&gt;&lt;/p&gt;
-
-&lt;p&gt;A change made in Cordova iOS 6.0.0 had the side effect of disabling 
landscape orientation for any apps that didn&amp;#39;t specify an 
&lt;code&gt;Orientation&lt;/code&gt; preference in 
&lt;code&gt;config.xml&lt;/code&gt;. We&amp;#39;ve reverted that change and new 
apps will match Xcode defaults (allowing both portrait and landscape 
orientations).&lt;/p&gt;
-
-&lt;p&gt;To ensure your app properly supports the orientations you want, we 
encourage setting &lt;a 
href=&quot;https://cordova.apache.org/docs/en/latest/config_ref/index.html#preference&quot;&gt;the
 &lt;code&gt;Orientation&lt;/code&gt; preference&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-&lt;li&gt;&lt;p&gt;&lt;strong&gt;Fix invisible SplashScreen 
bugs&lt;/strong&gt; &lt;em&gt;(since 6.0.0)&lt;/em&gt;&lt;/p&gt;
-
-&lt;p&gt;A bug in Cordova iOS 6.0.0 would cause the splashscreen to be 
invisible unless a &lt;code&gt;BackgroundColor&lt;/code&gt; preference was set 
in &lt;code&gt;config.xml&lt;/code&gt;. This was not the intended behaviour, 
and caused a lot of confusion about not being able to interact with the webview 
behind the splashscreen.&lt;/p&gt;
-
-&lt;p&gt;In Cordova iOS 6.1.0, we&amp;#39;ve fixed the splashscreen so that it 
will always have a background colour (defaulting to the system background 
colour) and so that the launch storyboard image should remain visible.&lt;/p&gt;
-
-&lt;p&gt;To customize the background colour of your app and its splashscreen, 
use &lt;a 
href=&quot;https://cordova.apache.org/docs/en/latest/config_ref/index.html#preference&quot;&gt;the
 &lt;code&gt;BackgroundColor&lt;/code&gt; preference&lt;/a&gt; in 
&lt;code&gt;config.xml&lt;/code&gt;.&lt;/p&gt;&lt;/li&gt;
-&lt;li&gt;&lt;p&gt;&lt;strong&gt;Add support for dark mode 
splashscreens&lt;/strong&gt; &lt;em&gt;(New Feature)&lt;/em&gt;&lt;/p&gt;
-
-&lt;p&gt;It is now possible to use optionally different splashscreen images 
when your app is running in dark mode. You can configure these images in 
&lt;code&gt;config.xml&lt;/code&gt; with the &lt;code&gt;~dark&lt;/code&gt; 
suffix (and &lt;code&gt;~light&lt;/code&gt; is also supported).&lt;/p&gt;
-&lt;div class=&quot;highlight&quot;&gt;&lt;pre&gt;&lt;code 
class=&quot;language-xml&quot; data-lang=&quot;xml&quot;&gt;&lt;span 
class=&quot;c&quot;&gt;&amp;lt;!-- Default image to be used for all modes 
--&amp;gt;&lt;/span&gt;
-&lt;span class=&quot;nt&quot;&gt;&amp;lt;splash&lt;/span&gt; &lt;span 
class=&quot;na&quot;&gt;src=&lt;/span&gt;&lt;span 
class=&quot;s&quot;&gt;&quot;res/screen/ios/Default@2x~universal~anyany.png&quot;&lt;/span&gt;
 &lt;span class=&quot;nt&quot;&gt;/&amp;gt;&lt;/span&gt;
-
-&lt;span class=&quot;c&quot;&gt;&amp;lt;!-- Image to use specifically for dark 
mode devices --&amp;gt;&lt;/span&gt;
-&lt;span class=&quot;nt&quot;&gt;&amp;lt;splash&lt;/span&gt; &lt;span 
class=&quot;na&quot;&gt;src=&lt;/span&gt;&lt;span 
class=&quot;s&quot;&gt;&quot;res/screen/ios/Default@2x~universal~anyany~dark.png&quot;&lt;/span&gt;
 &lt;span class=&quot;nt&quot;&gt;/&amp;gt;&lt;/span&gt;
-
-&lt;span class=&quot;c&quot;&gt;&amp;lt;!-- Image to use specifically for 
light mode devices --&amp;gt;&lt;/span&gt;
-&lt;span class=&quot;nt&quot;&gt;&amp;lt;splash&lt;/span&gt; &lt;span 
class=&quot;na&quot;&gt;src=&lt;/span&gt;&lt;span 
class=&quot;s&quot;&gt;&quot;res/screen/ios/Default@2x~universal~anyany~light.png&quot;&lt;/span&gt;
 &lt;span class=&quot;nt&quot;&gt;/&amp;gt;&lt;/span&gt;
-&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/li&gt;
-&lt;li&gt;&lt;p&gt;&lt;strong&gt;Add preference for iPad desktop layout 
behaviour&lt;/strong&gt; &lt;em&gt;(New Feature)&lt;/em&gt;&lt;/p&gt;
-
-&lt;p&gt;iPadOS 13 defaults to using a desktop layout in webviews rather than 
a mobile layout. You can now control this behaviour in your apps with &lt;a 
href=&quot;https://cordova.apache.org/docs/en/latest/config_ref/index.html#preference&quot;&gt;the
 &lt;code&gt;PreferredContentMode&lt;/code&gt; preference&lt;/a&gt; in 
&lt;code&gt;config.xml&lt;/code&gt;. Valid options are 
&lt;code&gt;mobile&lt;/code&gt; and 
&lt;code&gt;desktop&lt;/code&gt;.&lt;/p&gt;&lt;/li&gt;
-&lt;li&gt;&lt;p&gt;&lt;strong&gt;Add preference for webview window 
handling&lt;/strong&gt; &lt;em&gt;(New Feature)&lt;/em&gt;&lt;/p&gt;
-
-&lt;p&gt;Historically, Cordova iOS has not supported the creation of new 
webview windows with APIs like &lt;code&gt;window.open&lt;/code&gt; or links 
with &lt;code&gt;target=&amp;quot;_blank&amp;quot;&lt;/code&gt;. The default 
behaviour was inconsistent, with some links opening externally in Safari and 
some links being unclickable. There is now &lt;a 
href=&quot;https://cordova.apache.org/docs/en/latest/config_ref/index.html#preference&quot;&gt;an
 &lt;code&gt;AllowNewWindows&lt;/code&gt; preference&lt;/a&gt; in 
&lt;code&gt;config.xml&lt;/code&gt; to control the behaviour of new windows 
within the application.&lt;/p&gt;
-
-&lt;ul&gt;
-&lt;li&gt;When &lt;strong&gt;false&lt;/strong&gt; (the default behaviour), 
links that would open a new window are instead opened in the same webview as if 
they had not requested a new window.&lt;/li&gt;
-&lt;li&gt;When &lt;strong&gt;true&lt;/strong&gt;, links that would open a new 
window will create a new webview overtop of the app. This new webview provides 
no controls, so you must include a way to dismiss it with 
&lt;code&gt;window.close()&lt;/code&gt;.&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;p&gt;Links that are outside the list of &lt;a 
href=&quot;https://cordova.apache.org/docs/en/latest/config_ref/index.html#allow-navigation&quot;&gt;&lt;code&gt;allow-navigation&lt;/code&gt;&lt;/a&gt;
 URLs will continue to open in Safari.&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;p&gt;Please report any issues you find at &lt;a 
href=&quot;http://issues.cordova.io/&quot;&gt;issues.cordova.io&lt;/a&gt;!&lt;/p&gt;
-
-&lt;!--more--&gt;
-
-&lt;h2&gt;Full Changelog&lt;/h2&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;a 
href=&quot;https://github.com/apache/cordova-ios/pull/910&quot;&gt;GH-910&lt;/a&gt;
 Set &lt;code&gt;$PROJECT_NAME&lt;/code&gt; properly when installing 
plugins&lt;/li&gt;
-&lt;li&gt;&lt;a 
href=&quot;https://github.com/apache/cordova-ios/pull/885&quot;&gt;GH-885&lt;/a&gt;
 Don&amp;#39;t silently ignore creation of new windows&lt;/li&gt;
-&lt;li&gt;&lt;a 
href=&quot;https://github.com/apache/cordova-ios/issues/899&quot;&gt;GH-889&lt;/a&gt;
 Revert &amp;quot;(ios) Don&amp;#39;t pre-fill orientation&amp;quot; (&lt;a 
href=&quot;https://github.com/apache/cordova-ios/pull/901&quot;&gt;#901&lt;/a&gt;)&lt;/li&gt;
-&lt;li&gt;&lt;a 
href=&quot;https://github.com/apache/cordova-ios/pull/902&quot;&gt;GH-902&lt;/a&gt;
 chore: fix eslint failure&lt;/li&gt;
-&lt;li&gt;&lt;a 
href=&quot;https://github.com/apache/cordova-ios/pull/808&quot;&gt;GH-808&lt;/a&gt;
 Dark mode splashscreen storyboard images&lt;/li&gt;
-&lt;li&gt;&lt;a 
href=&quot;https://github.com/apache/cordova-ios/pull/886&quot;&gt;GH-886&lt;/a&gt;
 Add PreferredContentMode preference&lt;/li&gt;
-&lt;li&gt;&lt;a 
href=&quot;https://github.com/apache/cordova-ios/issues/890&quot;&gt;GH-890&lt;/a&gt;
 Fix SplashScreen issues &amp;amp; refactor BackgroundColor (&lt;a 
href=&quot;https://github.com/apache/cordova-ios/pull/896&quot;&gt;#896&lt;/a&gt;)&lt;/li&gt;
-&lt;li&gt;&lt;a 
href=&quot;https://github.com/apache/cordova-ios/pull/888&quot;&gt;GH-888&lt;/a&gt;
 fix: author and tag podspec errors&lt;/li&gt;
-&lt;li&gt;&lt;a 
href=&quot;https://github.com/apache/cordova-ios/pull/882&quot;&gt;GH-882&lt;/a&gt;
 fix: Properly get version from &lt;code&gt;package.json&lt;/code&gt;&lt;/li&gt;
-&lt;/ul&gt;
-</description>
-        <pubDate>Tue, 23 Jun 2020 00:00:00 +0000</pubDate>
-        
<link>https://cordova.apache.org/announcements/2020/06/23/cordova-ios-6.1.0.html</link>
-        <guid 
isPermaLink="true">https://cordova.apache.org/announcements/2020/06/23/cordova-ios-6.1.0.html</guid>
-        
-        <category>news</category>
-        
         <category>releases</category>
         
         

Modified: cordova/site/public/news/2020/09/18/camera-plugin-release.html
URL: 
http://svn.apache.org/viewvc/cordova/site/public/news/2020/09/18/camera-plugin-release.html?rev=1882136&r1=1882135&r2=1882136&view=diff
==============================================================================
--- cordova/site/public/news/2020/09/18/camera-plugin-release.html (original)
+++ cordova/site/public/news/2020/09/18/camera-plugin-release.html Tue Sep 29 
19:20:41 2020
@@ -223,6 +223,26 @@
             </div>
             <div class="col-sm-6">
                 
+                    <a href="/news/2020/09/29/cve-2020-6506.html">Next</a>
+                    <br>
+                    <br>
+                    <a class="title" 
href="/news/2020/09/29/cve-2020-6506.html">Security Advisory CVE-2020-6506</a>
+                    <div class="date"> 29 Sep 2020 - By Jesse MacFadyen </div>
+                    <p class="content">
+                        <!--
+                            NOTE:
+                                the markdownify filter is used here
+                                because posts are rendered in sequence;
+                                that is, the next post's content isn't
+                                yet rendered at the time that this post
+                                is being rendered, so page.next.excerpt
+                                is still in Markdown and not HTML
+
+                            Reference: 
https://github.com/jekyll/jekyll/issues/2860
+                        -->
+                        Security Advisory CVE-2020-6506 Formally Disclosed 
Advisory: https://bugs.chromium.org/p/chromium/issues/detail?id=1083819 This 
vulnerability is a universal...
+                    </p>
+                
             </div>
         </div>
     </footer>

Added: cordova/site/public/news/2020/09/29/cve-2020-6506.html
URL: 
http://svn.apache.org/viewvc/cordova/site/public/news/2020/09/29/cve-2020-6506.html?rev=1882136&view=auto
==============================================================================
--- cordova/site/public/news/2020/09/29/cve-2020-6506.html (added)
+++ cordova/site/public/news/2020/09/29/cve-2020-6506.html Tue Sep 29 19:20:41 
2020
@@ -0,0 +1,320 @@
+<!DOCTYPE html>
+<html lang="en">
+<head>
+    <meta charset="utf-8">
+    <meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
+    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
+    <meta name="format-detection" content="telephone=no">
+    <meta name="viewport" content="user-scalable=no, initial-scale=1, 
maximum-scale=1, minimum-scale=1, width=device-width" />
+    <meta name="description" content="Security Advisory CVE-2020-6506Formally 
Disclosed 
Advisory:https://bugs.chromium.org/p/chromium/issues/detail?id=1083819This 
vulnerability is a universal cro...">
+
+    <title>
+        
+            
+                Security Advisory CVE-2020-6506 - Apache Cordova
+            
+        
+    </title>
+
+    <link rel="SHORTCUT ICON" href="/favicon.ico"/>
+
+    
+
+    
+    
+
+    <link rel="canonical" 
href="https://cordova.apache.org/news/2020/09/29/cve-2020-6506.html";>
+
+    <!-- CSS -->
+    <link rel="stylesheet" type="text/css" href="/static/css/main.css">
+    <link rel="stylesheet" type="text/css" href="/static/css/lib/syntax.css">
+    <!-- Algolia Search CSS -->
+    <link rel="stylesheet" 
href="https://cdn.jsdelivr.net/docsearch.js/1/docsearch.min.css"; />
+
+    <!-- Fonts -->
+    <!-- For attribution information, see www/attributions.html -->
+    <link 
href='https://fonts.googleapis.com/css?family=Raleway:700,400,300,700italic,400italic,300italic'
 rel='stylesheet' type='text/css'>
+
+    <!-- HTML5 shim and Respond.js for IE8 support of HTML5 elements and media 
queries -->
+    <!--[if lt IE 9]>
+        <script 
src="https://oss.maxcdn.com/html5shiv/3.7.2/html5shiv.min.js";></script>
+        <script 
src="https://oss.maxcdn.com/respond/1.4.2/respond.min.js";></script>
+    <![endif]-->
+    <script type="text/javascript">
+        var disqus_developer = 1; // this would set it to developer mode
+    </script>
+
+    <!-- JS -->
+    <script defer type="text/javascript" 
src="/static/js/lib/jquery-2.1.1.min.js"></script>
+    <script defer type="text/javascript" 
src="/static/js/lib/bootstrap.min.js"></script>
+
+    <script>
+    
(function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){
+    (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new 
Date();a=s.createElement(o),
+    
m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m)
+    
})(window,document,'script','//www.google-analytics.com/analytics.js','ga');
+    ga('create', 'UA-64283057-3', 'auto');
+    ga('send', 'pageview');
+</script>
+
+</head>
+
+<body>
+    <header>
+    <a class="scroll-point pt-top" name="top"></a>
+    <nav class="navbar navbar-inverse navbar-fixed-top">
+        <div class="container-fluid">
+            <div class="navbar-header">
+                <button type="button" class="navbar-toggle collapsed" 
data-toggle="collapse" data-target="#navbar" aria-expanded="false" 
aria-controls="navbar">
+                    <span class="sr-only">Toggle navigation</span>
+                    <span class="icon-bar"></span>
+                    <span class="icon-bar"></span>
+                    <span class="icon-bar"></span>
+                </button>
+                <a class="navbar-brand" href="/"><img id="logo_top" 
src="/static/img/cordova-logo-newbrand.svg"/></a>
+            </div>
+            <div id="navbar" class="navbar-collapse collapse">
+                <div class="nav_bar_center">
+                    <ul class="nav navbar-nav">
+                        <li >
+                            <a href="/docs/en/latest/">Documentation</a>
+                        </li>
+                        <li >
+                            <a href="/plugins">Plugins</a>
+                        </li>
+                        <li class="active">
+                            <a href="/blog" id="blog_button">Blog<span 
class="badge" id="new_blog_count"></span></a>
+                        </li>
+                        <li >
+                            <a href="/contribute">Contribute</a>
+                        </li>
+                        <li>
+                            <a href="/#getstarted">Get Started</a>
+                        </li>
+                        <li>
+                            <form class="navbar-form navbar-right" 
id="header-search-form" role="search">
+                                <div class="input-group">
+                                    
+                                        
+                                    
+                                    <input id="header-search-field" 
type="text" placeholder="Search '9.x' docs..." class="form-control hidden-xs" 
autocomplete="off">
+                                </div>
+                            </form>
+                        </li>
+                    </ul>
+                </div>
+            </div><!--/.navbar-collapse -->
+        </div>
+    </nav>
+    <div id="_fixed_navbar_spacer" style="padding-top:50px"></div>
+</header>
+
+<div class="page container">
+    <div class="blog">
+    <h1 class="blogHeader">
+    Blog
+    <span class="rss">
+        <img src="/static/img/subscribe.png"><a href="/feed.xml">RSS Feed</a>
+    </span>
+</h1>
+
+<div class="post">
+    <header>
+        <div class="title">Security Advisory CVE-2020-6506</div>
+        <div class="author">By:
+            
+              Jesse MacFadyen
+            
+        </div>
+        <div class="date">29 Sep 2020</div>
+    </header>
+    <section>
+        <div>
+            <h1>Security Advisory CVE-2020-6506</h1>
+
+<h3>Formally Disclosed Advisory:</h3>
+
+<ul>
+<li>https://bugs.chromium.org/p/chromium/issues/detail?id=1083819</li>
+</ul>
+
+<p>This vulnerability is a universal cross-site scripting (UXSS) vulnerability 
in Android WebView which allows cross-origin iframes to execute arbitrary 
JavaScript in the top-level document.  Apache Cordova apps built for Android 
devices which allow the loading of http content from domains they do not 
control could be affected.  Theoretically this would be either in an iframe, or 
by use of the InAppBrowser plugin (cordova-plugin-inappbrowser).</p>
+
+<p>If your app loads a local page (e.g. index.html within Cordova app loads 
iframe from <a href="#">malicious-example.com</a>), no user interaction is 
required for this exploit.</p>
+
+<p>This vulnerability has been fixed in Android WebView as of version 
83.0.4103.106.
+Users must update their Android WebView from the Google Play Store 
themselves.</p>
+
+<h3>Mitigation</h3>
+
+<p>There are precautions you can take to avoid this vulnerability.</p>
+
+<ol>
+<li>Use a restrictive an allow-list and content security policy (CSP) as 
possible.<br>
+
+<ul>
+<li>https://cordova.apache.org/docs/en/latest/reference/cordova-plugin-whitelist/</li>
+<li>Ensure CSPs do not include &#39;unsafe-line&#39; for 
script-src/default-src unless necessary.</li>
+</ul></li>
+<li>Generally, always load local code into your application&#39;s main 
webview, and use InAppBrowser to display anything remote.
+
+<ul>
+<li>Always load untrusted content into an external browser (i.e. call 
InAppBrowser with <code>_system</code>)</li>
+<li>https://cordova.apache.org/docs/en/latest/reference/cordova-plugin-inappbrowser/</li>
+</ul></li>
+<li><p>Do not use iframes, and if you must, never do so in your 
application&#39;s main webview. Using the <code>sandbox</code> attribute will 
mitigate this vulnerability ( preferably with an empty value. ) Avoid using 
these sandbox attributes together <code>allow-popups allow-top-navigation 
allow-scripts</code> because they do NOT mitigate this vulnerability.</p>
+<div class="highlight"><pre><code class="language-js" data-lang="js"><span 
class="o">&lt;</span><span class="nx">iframe</span> <span 
class="nx">sandbox</span><span class="o">=</span><span class="s1">''</span> 
<span class="nx">src</span><span class="o">=</span><span 
class="s1">'http://untrusted-source'</span> <span class="o">/&gt;</span>
+</code></pre></div></li>
+</ol>
+
+<p>Most of these precautions have always been gentle recommendations of Apache 
Cordova, but were not reflected in the default values which were typically left 
open. The Apache Cordova committers are investigating preventing this 
vulnerability at the framework level, as well as tightening the default values 
to prevent inadvertant exposure. In the meantime, if you suspect your app is 
vulnerable, please follow the precautions above.</p>
+
+<p>Credit ( and thanks ) go to Alesandro Ortiz for discovering this 
vulnerability and bringing it to our attention.</p>
+
+<h3>Additional References</h3>
+
+<ul>
+<li>https://alesandroortiz.com/articles/uxss-android-webview-cve-2020-6506/</li>
+<li>https://nvd.nist.gov/vuln/detail/CVE-2020-6506</li>
+</ul>
+
+        </div>
+    </section>
+    <footer>
+        <div class="row">
+            <div class="col-sm-6">
+                
+                    <a 
href="/news/2020/09/18/camera-plugin-release.html">Previous</a>
+                    <br>
+                    <br>
+                    <a class="title" 
href="/news/2020/09/18/camera-plugin-release.html">Camera Plugin Released!</a>
+                    <div class="date"> 18 Sep 2020 - By Bryan Ellis </div>
+                    <p class="content">
+                        We are happy to announce that we have just released an 
update...
+                    </p>
+                
+            </div>
+            <div class="col-sm-6">
+                
+            </div>
+        </div>
+    </footer>
+    <div class="disqus">
+        <div id="disqus_thread"></div>
+<script type="text/javascript">
+    /* * * CONFIGURATION VARIABLES * * */
+    var disqus_shortname = 'cordovablogs';
+
+    /* * * DON'T EDIT BELOW THIS LINE * * */
+    (function() {
+        var dsq = document.createElement('script'); dsq.type = 
'text/javascript'; dsq.async = true;
+        dsq.src = '//' + disqus_shortname + '.disqus.com/embed.js';
+        (document.getElementsByTagName('head')[0] || 
document.getElementsByTagName('body')[0]).appendChild(dsq);
+    })();
+</script>
+<noscript>Please enable JavaScript to view the <a 
href="https://disqus.com/?ref_noscript"; rel="nofollow">comments powered by 
Disqus.</a></noscript>
+
+    </div>
+</div>
+
+</div>
+
+</div>
+
+<div class="blue-divider"></div>
+<footer>
+    <div class="container">
+        <div class="row">
+    <div class="col-sm-9">
+        <h1>More Resources</h1>
+        <div class="row">
+            <div class="col-sm-4">
+                <h2>General</h2>
+                <ul class="nav">
+                    <li>
+                        <a target="_blank" 
href="https://projects.apache.org/project.html?cordova";>Apache Project Page</a>
+                    </li>
+                    <li>
+                        <a 
href="http://www.apache.org/dyn/closer.cgi/cordova";>Source Distribution</a>
+                    </li>
+                    <li>
+                        <a target="_blank" 
href="http://www.apache.org/licenses/LICENSE-2.0";>License</a>
+                    </li>
+                    <li>
+                        <a href="/artwork">Artwork</a>
+                    </li>
+                </ul>
+            </div>
+            <div class="col-sm-4">
+                <h2>Development</h2>
+                <ul class="nav">
+                    <li><a target="_blank" 
href="https://github.com/apache?utf8=%E2%9C%93&amp;q=cordova-";>Source 
Code</a></li>
+                    <li><a target="_blank" 
href="https://issues.apache.org/jira/browse/CB/";>Issue Tracker</a></li>
+                    <li><a target="_blank" 
href="http://stackoverflow.com/questions/tagged/cordova";>Stack Overflow</a></li>
+                    <li><a href="/contact">Mailing List</a></li>
+                    <li><a href="/contribute/nightly_builds.html">Nightly 
builds</a></li>
+                </ul>
+            </div>
+            <div class="col-sm-4">
+                <h2>Apache Software Foundation</h2>
+                <ul class="nav">
+                    <li>
+                        <a target="_blank" href="http://www.apache.org/";>About 
ASF</a>
+                    </li>
+                    <li>
+                        <a target="_blank" 
href="http://www.apache.org/foundation/sponsorship.html";>Become a Sponsor</a>
+                    </li>
+                    <li>
+                        <a target="_blank" 
href="http://www.apache.org/foundation/thanks.html";>Thanks</a>
+                    </li>
+                    <li>
+                        <a target="_blank" 
href="http://www.apache.org/security/";>Security</a>
+                    </li>
+                </ul>
+            </div>
+        </div>
+    </div>
+    <div class="col-sm-3">
+        <h1>Contribute</h1>
+        <p style="padding-top:20px"><strong>Help Cordova move 
forward!</strong></p>
+        <p>Report bugs, improve the docs, or contribute to the code.</p>
+        <a href="/contribute" class="btn btn-lg btn-primary">
+            Learn More
+        </a>
+        <p style="padding-top:20px"> <a 
href="https://twitter.com/apachecordova"; class="twitter-follow-button" 
data-show-count="false">Follow @apachecordova</a></p>
+        <script async defer 
src="https://slack-cordova-io.herokuapp.com/slackin.js";></script>
+    </div>
+</div>
+<p class="copyright_text">
+    Copyright &copy; 2012, 2013, 2015 The Apache Software Foundation, Licensed 
under the <a target="_blank" 
href="http://www.apache.org/licenses/LICENSE-2.0";>Apache License, Version 
2.0</a>.<br/>
+    Apache and the Apache feather logos are <a target="_blank" 
href="http://www.apache.org/foundation/marks/list/";>trademarks</a> of The 
Apache Software Foundation.
+    <br/>
+    "Raleway" font used under license. For details see the <a 
href="/attributions/">attributions page</a>.
+</p>
+
+    </div>
+</footer>
+
+
+    <script defer type="text/javascript" src="/static/js/index.js"></script>
+    <script defer type="text/javascript" src="/static/js/twitter.js"></script>
+    
+    
+
+
+
+    
+
+
+<script type="text/javascript" 
src="https://cdn.jsdelivr.net/docsearch.js/1/docsearch.min.js";></script>
+<script type="text/javascript">
+    docsearch({
+        apiKey: '0a916ab198bd93d031aa70611271e42e',
+        indexName: 'cordova',
+        inputSelector: '#header-search-field',
+        algoliaOptions: { 'facetFilters': ["version:  9.x", "language: en"] }
+    });
+</script>
+
+</body>
+</html>

Modified: cordova/site/public/sitemap.xml
URL: 
http://svn.apache.org/viewvc/cordova/site/public/sitemap.xml?rev=1882136&r1=1882135&r2=1882136&view=diff
==============================================================================
--- cordova/site/public/sitemap.xml (original)
+++ cordova/site/public/sitemap.xml Tue Sep 29 19:20:41 2020
@@ -4,6 +4,11 @@
 <!-- posts -->
 
 <url>
+    <loc>https://cordova.apache.org/news/2020/09/29/cve-2020-6506.html</loc>
+</url>
+
+
+<url>
     
<loc>https://cordova.apache.org/news/2020/09/18/camera-plugin-release.html</loc>
 </url>
 

Modified: cordova/site/public/static/js/index.js
URL: 
http://svn.apache.org/viewvc/cordova/site/public/static/js/index.js?rev=1882136&r1=1882135&r2=1882136&view=diff
==============================================================================
--- cordova/site/public/static/js/index.js (original)
+++ cordova/site/public/static/js/index.js Tue Sep 29 19:20:41 2020
@@ -77,6 +77,7 @@ function checkNotification() {
     var dates = [];
     if (lastVisit != "") {
         
+        dates.push('Tue, 29 Sep 2020 00:00:00 +0000');
         dates.push('Fri, 18 Sep 2020 00:00:00 +0000');
         dates.push('Mon, 31 Aug 2020 00:00:00 +0000');
         dates.push('Fri, 14 Aug 2020 00:00:00 +0000');



---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to