Reputation: 2475
Can someone explain to me the potential security vulnerabilities associated with having * for the Cordova/PhoneGap url whitelist i.e. allowing all urls?
Upvotes: 1
Views: 1463
Reputation: 276
I just read an article and I think you would be interesting on it. Just check it out:
http://www.nerdybeardo.com/2013/11/phonegap-xss-vulnerabilities-visited/
Upvotes: 1
Reputation: 1023
I work for an organisation that needs secure mobile apps and we've ruled out Phonegap / Cordova because of security concerns. Cordova provides a javascript API that allows you to control most of the phone's hardware and major OS components. A web view allows you to load script from anywhere that could then call those API's. Here's a simple example :-
The app itself or any content that it consumes could have an XSS vulnerability that makes the phone wide open.
There are also several other attacks that could be done on the phone itself, particularly if the phone is jailbroken and the JS content of the app can be modified.
Upvotes: 0
Reputation: 23273
It just means that your app will trust all external hosts and be able to communicate with them. You'll just have to make sure that your app does not make it easy for users to follow links or input data that could be dangerous.
If you can get away with having to use * that would be best but if you are doing something like a RSS reader then I can't see any other way.
Upvotes: 0