Lucene search

K
hackappHackapp.orgHACKAPP:COM.DICONLINE.RAKROID.APK
HistoryApr 01, 2016 - 8:49 a.m.

دیکشنری سخن شنو و سخنگو - Corrupted files, Customized SSL, External URLs vulnerabilities

2016-04-0108:49:15
Hackapp.org
hackapp.com
10

HackApp vulnerability scanner discovered that application دیکشنری سخن شنو و سخنگو published at the ‘play’ market has multiple vulnerabilities.

Name

دیکشنری سخن شنو و سخنگو

Vendor

R & R

Link

COM.DICONLINE.RAKROID.APK

Store

play

Version

1
  • MEDIUM
  • Runtime command execution

    Function 'Runtime.getRuntime().exec()' is used, please check where variables are come from.

  • WebView files access

    Control of WebView context allows to access local files.

  • WebView JavaScript enabled

    WebView 'setJavaScriptEnabled(true)' could be exploited during cross-site scripting attacks.

  • SD-card access

    SD-cards and other external storages have 'worldwide read' policy.

  • SQLite database found

    Check VACUUM cleaning.

  • NOTICE
  • Possible privilege escalation

    This app is looking for root tools.

  • Corrupted files

    Can't parse these files. Corrupted? Check manually.

  • Unsafe deleting

    All items deleted with 'file.delete()' could be recovered.

  • Suspicious files

    Are you sure these files should be here?

  • External URLs

    Were do they point?

  • CRITICAL
  • Customized SSL

    Check certificate validation. Do not create or redefine X509Certificate class methods by yourself, if you don't understand risks. Use the existing API.