Lucene search

K
hackappHackapp.orgHACKAPP:COM.COUCHSURFING.MOBILE.ANDROID.APK
HistoryApr 01, 2016 - 9:33 a.m.

Couchsurfing Travel App - AWS Credentials, Customized SSL, Dangerous filesystem permissions vulnerabilities

2016-04-0109:33:30
Hackapp.org
hackapp.com
8

HackApp vulnerability scanner discovered that application Couchsurfing Travel App published at the ‘play’ market has multiple vulnerabilities.

Name

Couchsurfing Travel App

Vendor

CouchSurfing Inc.

Link

COM.COUCHSURFING.MOBILE.ANDROID.APK

Store

play

Version

Varies with device
  • CRITICAL
  • MIT license

    The app should be compliant with open source license requirements.

  • Dangerous filesystem permissions

    Files created with these methods could be worldwide readable.

  • Customized SSL

    Check certificate validation. Do not create or redefine X509Certificate class methods by yourself, if you don't understand risks. Use the existing API.

  • WebView code execution

    WebView 'addJavascriptInterface' could be used to control the host app with JavaScript bindings. Remote Code Execution (RCE) is possible.

  • AWS Credentials

    Everyone can use it to access your resources.

  • Redefined SSL Common Names verifier

    This app uses self defined certificate verifier. If it is not properly configured it could allow attackers to do MITM attacks with their valid certificate without your knowledge.

  • MEDIUM
  • WebView files access

    Control of WebView context allows to access local files.

  • WebView JavaScript enabled

    WebView 'setJavaScriptEnabled(true)' could be exploited during cross-site scripting attacks.

  • SD-card access

    SD-cards and other external storages have 'worldwide read' policy.

  • Dynamic Code Loading

    Code for 'DexClassLoader' could be tampered.

  • Exported components

    Other applications could access the interfaces.

  • NOTICE
  • Suspicious files

    Are you sure these files should be here?

  • External URLs

    Were do they point?

  • Unsafe deleting

    All items deleted with 'file.delete()' could be recovered.

  • KeyStore usage

    The app uses Android KeyStore subsystem.