Lucene search

K
hackappHackapp.orgHACKAPP:COM.ALK.COPILOT.MAPVIEWER.APK
HistoryApr 01, 2016 - 9:33 a.m.

CoPilot GPS - Navigation - Base64 encoded String, Certificates or keys found, Corrupted files vulnerabilities

2016-04-0109:33:36
Hackapp.org
hackapp.com
8

HackApp vulnerability scanner discovered that application CoPilot GPS - Navigation published at the β€˜play’ market has multiple vulnerabilities.

Name

CoPilot GPS - Navigation

Vendor

ALK Technologies

Link

COM.ALK.COPILOT.MAPVIEWER.APK

Store

play

Version

Varies with device
  • CRITICAL
  • Base64 encoded String

    Base64 encoded string could include authentication credentials.

  • MEDIUM
  • SD-card access

    SD-cards and other external storages have 'worldwide read' policy.

  • WebView JavaScript enabled

    WebView 'setJavaScriptEnabled(true)' could be exploited during cross-site scripting attacks.

  • Exported components

    Other applications could access the interfaces.

  • WebView files access

    Control of WebView context allows to access local files.

  • Certificates or keys found

    These credentials could be used for authentication.

  • NOTICE
  • Corrupted files

    Can't parse these files. Corrupted? Check manually.

  • Suspicious files

    Are you sure these files should be here?

  • Unsafe deleting

    All items deleted with 'file.delete()' could be recovered.

  • External URLs

    Where do they point?