This is an automated email from the ASF dual-hosted git repository.

purplecabbage pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/cordova-docs.git


The following commit(s) were added to refs/heads/master by this push:
     new 5426195  fixed links that were not links
5426195 is described below

commit 54261953a915ed6342e1c03480c4653ea5724505
Author: Jesse MacFadyen <[email protected]>
AuthorDate: Wed Sep 30 11:10:07 2020 -0700

    fixed links that were not links
---
 www/_posts/2020-09-29-cve-2020-6506.md | 14 +++++++-------
 1 file changed, 7 insertions(+), 7 deletions(-)

diff --git a/www/_posts/2020-09-29-cve-2020-6506.md 
b/www/_posts/2020-09-29-cve-2020-6506.md
index 54e655f..6002f1d 100644
--- a/www/_posts/2020-09-29-cve-2020-6506.md
+++ b/www/_posts/2020-09-29-cve-2020-6506.md
@@ -8,10 +8,8 @@ tags: security advisory
 ---
 
 
-# Security Advisory CVE-2020-6506
-
 ### Formally Disclosed Advisory:
-- https://bugs.chromium.org/p/chromium/issues/detail?id=1083819
+- 
[https://bugs.chromium.org/p/chromium/issues/detail?id=1083819](https://bugs.chromium.org/p/chromium/issues/detail?id=1083819)
 
 
 This vulnerability is a universal cross-site scripting (UXSS) vulnerability in 
Android WebView which allows cross-origin iframes to execute arbitrary 
JavaScript in the top-level document.  Apache Cordova apps built for Android 
devices which allow the loading of http content from domains they do not 
control could be affected.  Theoretically this would be either in an iframe, or 
by use of the InAppBrowser plugin (cordova-plugin-inappbrowser).
@@ -26,11 +24,11 @@ Users must update their Android WebView from the Google 
Play Store themselves.
 There are precautions you can take to avoid this vulnerability.
 
 1. Use a restrictive an allow-list and content security policy (CSP) as 
possible.  
-    - 
https://cordova.apache.org/docs/en/latest/reference/cordova-plugin-whitelist/
+    - 
[https://cordova.apache.org/docs/en/latest/reference/cordova-plugin-whitelist/](https://cordova.apache.org/docs/en/latest/reference/cordova-plugin-whitelist/)
     - Ensure CSPs do not include 'unsafe-line' for script-src/default-src 
unless necessary.
 1. Generally, always load local code into your application's main webview, and 
use InAppBrowser to display anything remote.
     - Always load untrusted content into an external browser (i.e. call 
InAppBrowser with `_system`)
-    - 
https://cordova.apache.org/docs/en/latest/reference/cordova-plugin-inappbrowser/
+    - 
[https://cordova.apache.org/docs/en/latest/reference/cordova-plugin-inappbrowser/](https://cordova.apache.org/docs/en/latest/reference/cordova-plugin-inappbrowser/)
 1. Do not use iframes, and if you must, never do so in your application's main 
webview. Using the `sandbox` attribute will mitigate this vulnerability ( 
preferably with an empty value. ) Avoid using these sandbox attributes together 
`allow-popups allow-top-navigation allow-scripts` because they do NOT mitigate 
this vulnerability.
     
     ```js
@@ -42,5 +40,7 @@ Most of these precautions have always been gentle 
recommendations of Apache Cord
 Credit ( and thanks ) go to Alesandro Ortiz for discovering this vulnerability 
and bringing it to our attention.
 
 ### Additional References
-- https://alesandroortiz.com/articles/uxss-android-webview-cve-2020-6506/
-- https://nvd.nist.gov/vuln/detail/CVE-2020-6506
+- 
[https://alesandroortiz.com/articles/uxss-android-webview-cve-2020-6506/](https://alesandroortiz.com/articles/uxss-android-webview-cve-2020-6506/)
+- 
[https://nvd.nist.gov/vuln/detail/CVE-2020-6506](https://nvd.nist.gov/vuln/detail/CVE-2020-6506)
+
+_edit: fixed links that weren't linking_ -JM
\ No newline at end of file


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to