HackApp vulnerability scanner discovered that application Dumb Ways to Die published at the βplayβ market has multiple vulnerabilities.
WebView 'setJavaScriptEnabled(true)' could be exploited during cross-site scripting attacks.
Control of WebView context allows to access local files.
SD-cards and other external storages have 'worldwide read' policy.
Code for 'DexClassLoader' could be tampered.
Everyone can use it to access your resources.
This app uses self defined certificate verifier. If it is not properly configured it could allow attackers to do MITM attacks with their valid certificate without your knowledge.
WebView 'addJavascriptInterface' could be used to control the host app with JavaScript bindings. Remote Code Execution (RCE) is possible.
Files created with these methods could be worldwide readable.
Check certificate validation. Do not create or redefine X509Certificate class methods by yourself, if you don't understand risks. Use the existing API.
The app uses Android KeyStore subsystem with hardcoded authentication.
Are you sure these files should be here?
Native code (.so) usage 'System.loadLibrary();' is found.
Can't parse these files. Corrupted? Check manually.
This app is looking for root tools.
Where do they point?
All items deleted with 'file.delete()' could be recovered.
CPE | Name | Operator | Version |
---|---|---|---|
dumb ways to die | le | N/A |