HackApp vulnerability scanner discovered that application Doomsday Preppers™ published at the ‘play’ market has multiple vulnerabilities.
This app is looking for root tools.
Were do they point?
Native code (.so) usage 'System.loadLibrary();' is found.
Can't parse these files. Corrupted? Check manually.
Are you sure these files should be here?
All items deleted with 'file.delete()' could be recovered.
WebView 'addJavascriptInterface' could be used to control the host app with JavaScript bindings. Remote Code Execution (RCE) is possible.
The app should be compliant with open source license requirements.
Files created with these methods could be worldwide readable.
Everyone can use it to access your resources.
The app uses Android KeyStore subsystem with hardcoded authentication.
Check certificate validation. Do not create or redefine X509Certificate class methods by yourself, if you don't understand risks. Use the existing API.
Control of WebView context allows to access local files.
Code for 'DexClassLoader' could be tampered.
Other applications could access the interfaces.
WebView 'setJavaScriptEnabled(true)' could be exploited during cross-site scripting attacks.
SD-cards and other external storages have 'worldwide read' policy.
Check VACUUM cleaning.
CPE | Name | Operator | Version |
---|---|---|---|
doomsday preppers™ | le | 127.0.7 |