@pramod-nair wrote:
One of our static security code analysis tool is flagging following iOS code for “Path Manipulation” vulnerability.
/cordova-plugin-ionic-webview/IONAssetHandler.m
NSData * data = [[NSData alloc] initWithContentsOfFile:startPath];
/CordovaLib/Classes/Public/CDVViewController.m
self.configParser = [[NSXMLParser alloc] initWithContentsOfURL:url];
/CordovaLib/Classes/Private/Plugins/CDVLocalStorage/CDVLocalStorage.m
BOOL ok = [appPlistDict writeToFile:appPlistPathatomically:YES];
/CordovaLib/Classes/Private/Plugins/CDVLocalStorage/CDVLocalStorage.m
NSMutableDictionary* appPlistDict = [NSMutableDictionary dictionaryWithContentsOfFile:appPlistPath];
…BOOL ok = [appPlistDict writeToFile:appPlistPath atomically:YES];
PLEASE HELP TO MITIGATE THIS important issue.
Posts: 1
Participants: 1