Lucene search

K
hackappHackapp.orgHACKAPP:AIR.AU.COM.METRO.DUMBWAYSTODIE.APK
HistoryApr 01, 2016 - 9:53 a.m.

Dumb Ways to Die - AWS Credentials, Customized SSL, Dangerous filesystem permissions vulnerabilities

2016-04-0109:53:23
Hackapp.org
hackapp.com
6

HackApp vulnerability scanner discovered that application Dumb Ways to Die published at the β€˜play’ market has multiple vulnerabilities.

Name

Dumb Ways to Die

Vendor

Metro Trains

Link

AIR.AU.COM.METRO.DUMBWAYSTODIE.APK

Store

play

Version

N/A
  • MEDIUM
  • WebView JavaScript enabled

    WebView 'setJavaScriptEnabled(true)' could be exploited during cross-site scripting attacks.

  • WebView files access

    Control of WebView context allows to access local files.

  • SD-card access

    SD-cards and other external storages have 'worldwide read' policy.

  • Dynamic Code Loading

    Code for 'DexClassLoader' could be tampered.

  • CRITICAL
  • AWS Credentials

    Everyone can use it to access your resources.

  • Redefined SSL Common Names verifier

    This app uses self defined certificate verifier. If it is not properly configured it could allow attackers to do MITM attacks with their valid certificate without your knowledge.

  • WebView code execution

    WebView 'addJavascriptInterface' could be used to control the host app with JavaScript bindings. Remote Code Execution (RCE) is possible.

  • Dangerous filesystem permissions

    Files created with these methods could be worldwide readable.

  • Customized SSL

    Check certificate validation. Do not create or redefine X509Certificate class methods by yourself, if you don't understand risks. Use the existing API.

  • Insecure KeyStore

    The app uses Android KeyStore subsystem with hardcoded authentication.

  • NOTICE
  • Suspicious files

    Are you sure these files should be here?

  • Native code usage

    Native code (.so) usage 'System.loadLibrary();' is found.

  • Corrupted files

    Can't parse these files. Corrupted? Check manually.

  • Possible privilege escalation

    This app is looking for root tools.

  • External URLs

    Where do they point?

  • Unsafe deleting

    All items deleted with 'file.delete()' could be recovered.

CPENameOperatorVersion
dumb ways to dieleN/A