ID HACKAPP:AUL.IRM.RULETA.APK
Type hackapp
Reporter Hackapp.org
Modified 2016-04-01T10:15:00
Description
HackApp vulnerability scanner discovered that application Ruletras published at the 'play' market has multiple vulnerabilities.
{"cvelist": [], "published": "2016-04-01T10:15:00", "bulletinFamily": "software", "objectVersion": "1.2", "href": "https://hackapp.com/report/6113c6924bfe10cc4b6dfb7a60f0160e", "lastseen": "2016-09-26T20:43:26", "id": "HACKAPP:AUL.IRM.RULETA.APK", "hackapp": {"link": "https://play.google.com/store/apps/details?id=aul.irm.ruleta&hl=en", "bugs": [{"description": "WebView 'setJavaScriptEnabled(true)' could be exploited during cross-site scripting attacks.", "severity": "medium", "id": "e9ab10fdb31022bbbeb71a3d0c82fcd9", "name": "WebView JavaScript enabled"}, {"description": "This app is looking for root tools.", "severity": "notice", "id": "899fef845d6a0935535a6508fa5aa8ee", "name": "Possible privilege escalation"}, {"description": "Are you sure these files should be here?", "severity": "notice", "id": "70eefe985c112aaa57e7d537178ff830", "name": "Suspicious files"}, {"description": "Were do they point?", "severity": "notice", "id": "fe6b454e131867f25b6f84d901776cda", "name": "External URLs"}, {"description": "SD-cards and other external storages have 'worldwide read' policy.", "severity": "medium", "id": "73f7d06d04741430019f3ee5a58f0bb2", "name": "SD-card access"}, {"description": "Files created with these methods could be worldwide readable.", "severity": "critical", "id": "43efd92447ee60fdbada37a46ba9e4d8", "name": "Dangerous filesystem permissions"}, {"description": "Native code (.so) usage 'System.loadLibrary();' is found.", "severity": "notice", "id": "f8a5e68e99c0ff8b3a285ba6676fcf42", "name": "Native code usage"}, {"description": "\n\t\t\tCheck certificate validation. Do not create or redefine X509Certificate class methods by yourself, if you don't understand risks. Use the existing API.\n\t\t\t", "severity": "critical", "id": "750950de9a32e00749faef5ae2fc7028", "name": "Customized SSL"}, {"description": "Control of WebView context allows to access local files.\n\t\t\t", "severity": "medium", "id": "bd0158e1c631c29e17df371d4359d47c", "name": "WebView files access"}, {"description": "Other applications could access the interfaces.", "severity": "medium", "id": "027f0340e36af24270c39d37d606171b", "name": "Exported components"}, {"description": "All items deleted with 'file.delete()' could be recovered.", "severity": "notice", "id": "e640f9eee35f5c65de5db7f3aa037c86", "name": "Unsafe deleting"}, {"description": "WebView 'addJavascriptInterface' could be used to control the host app with JavaScript bindings. Remote Code Execution (RCE) is possible.", "severity": "critical", "id": "a12f4a229c5f85c5e2d538f1be6117fc", "name": "WebView code execution"}, {"description": "Code for 'DexClassLoader' could be tampered.", "severity": "medium", "id": "3281437cd03fdbbe2e0731898533780a", "name": "Dynamic Code Loading"}, {"description": "Passwords or tokens here. Everyone can see and use it.", "severity": "critical", "id": "40c749c8a57d84b21975a2177de745c5", "name": "Hardcoded secrets"}], "vendor": "Pandereta Estudio.", "release": "2015-11-24T00:00:00", "version": "1.3", "apk": "AUL.IRM.RULETA.APK", "store": "play", "name": "Ruletras", "icon": "http://lh3.googleusercontent.com/EQfU8f5BjKllMxNsyXnM1nSb5el7_FoLGBhL4pcrB0pUBa172hNr0qZqBf4W-iFqog=w300"}, "reporter": "Hackapp.org", "references": ["https://play.google.com/store/apps/details?id=aul.irm.ruleta&hl=en"], "hashmap": [{"hash": "75926b356b75ac2193bcdf3fcb0e49b7", "key": "affectedSoftware"}, {"hash": "f9fa10ba956cacf91d7878861139efb9", "key": "bulletinFamily"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "d4be9c4fc84262b4f39f89565918568f", "key": "cvss"}, {"hash": "91c8d67d67eeda3b804ee840fa78daec", "key": "description"}, {"hash": "8d5c9ff1b64af6904addeff0f34d9d4d", "key": "hackapp"}, {"hash": "dee18d271c0f0d25f1b92ca13cefc373", "key": "href"}, {"hash": "f90aaa76d288d675d5ffa3174d02f123", "key": "modified"}, {"hash": "56765472680401499c79732468ba4340", "key": "objectVersion"}, {"hash": "f90aaa76d288d675d5ffa3174d02f123", "key": "published"}, {"hash": "9e23555f664426e3d513547db23a5481", "key": "references"}, {"hash": "3b012aae1848bb95fe11f3cebae83cb0", "key": "reporter"}, {"hash": "2f3de8ca62bc03a08e4593f4efbb394a", "key": "title"}, {"hash": "96e87ef1fcc8d9d3cdd337488987c423", "key": "type"}, {"hash": "cfcd208495d565ef66e7dff9f98764da", "key": "viewCount"}], "description": "HackApp vulnerability scanner discovered that application Ruletras published at the 'play' market has multiple vulnerabilities.", "modified": "2016-04-01T10:15:00", "cvss": {"vector": "NONE", "score": 0.0}, "viewCount": 0, "type": "hackapp", "affectedSoftware": [{"name": "Ruletras", "operator": "le", "version": "1.3"}], "title": "Ruletras - Customized SSL, Dangerous filesystem permissions, Hardcoded secrets vulnerabilities", "hash": "0c22a57136158fc38d7fc5b26ee2fa0611b88bd64b5d718ba4e88205b56af689", "history": [], "edition": 1, "enchantments": {"vulnersScore": 5.0}}
{"result": {}}