HackApp vulnerability scanner discovered that application Solitaire classic card game published at the βplayβ market has multiple vulnerabilities.
Code for 'DexClassLoader' could be tampered.
SD-cards and other external storages have 'worldwide read' policy.
Function 'Runtime.getRuntime().exec()' is used, please check where variables are come from.
Control of WebView context allows to access local files.
Other applications could access the interfaces.
WebView 'setJavaScriptEnabled(true)' could be exploited during cross-site scripting attacks.
Were do they point?
Are you sure these files should be here?
All items deleted with 'file.delete()' could be recovered.
Check certificate validation. Do not create or redefine X509Certificate class methods by yourself, if you don't understand risks. Use the existing API.
This app uses self defined certificate verifier. If it is not properly configured it could allow attackers to do MITM attacks with their valid certificate without your knowledge.
WebView 'addJavascriptInterface' could be used to control the host app with JavaScript bindings. Remote Code Execution (RCE) is possible.
Everyone can use it to access your resources.
Files created with these methods could be worldwide readable.
CPE | Name | Operator | Version |
---|---|---|---|
solitaire classic card game | le | 2.5 |