HackApp vulnerability scanner discovered that application Couchsurfing Travel App published at the ‘play’ market has multiple vulnerabilities.
The app should be compliant with open source license requirements.
Files created with these methods could be worldwide readable.
Check certificate validation. Do not create or redefine X509Certificate class methods by yourself, if you don't understand risks. Use the existing API.
WebView 'addJavascriptInterface' could be used to control the host app with JavaScript bindings. Remote Code Execution (RCE) is possible.
Everyone can use it to access your resources.
This app uses self defined certificate verifier. If it is not properly configured it could allow attackers to do MITM attacks with their valid certificate without your knowledge.
Control of WebView context allows to access local files.
WebView 'setJavaScriptEnabled(true)' could be exploited during cross-site scripting attacks.
SD-cards and other external storages have 'worldwide read' policy.
Code for 'DexClassLoader' could be tampered.
Other applications could access the interfaces.
Are you sure these files should be here?
Were do they point?
All items deleted with 'file.delete()' could be recovered.
The app uses Android KeyStore subsystem.
CPE | Name | Operator | Version |
---|---|---|---|
couchsurfing travel app | le | Varies with device |