HackApp vulnerability scanner discovered that application Monster Catty Hair Salon published at the βplayβ market has multiple vulnerabilities.
The app uses Android KeyStore subsystem with hardcoded authentication.
Files created with these methods could be worldwide readable.
Everyone can use it to access your resources.
WebView 'setJavaScriptEnabled(true)' could be exploited during cross-site scripting attacks.
SD-cards and other external storages have 'worldwide read' policy.
Control of WebView context allows to access local files.
Code for 'DexClassLoader' could be tampered.
This app is looking for root tools.
All items deleted with 'file.delete()' could be recovered.
Are you sure these files should be here?
Were do they point?
CPE | Name | Operator | Version |
---|---|---|---|
monster catty hair salon | le | 1.0 |