HackApp vulnerability scanner discovered that application Slots Free - Big Win Casino™ published at the ‘play’ market has multiple vulnerabilities.
This app is looking for root tools.
Where do they point?
All items deleted with 'file.delete()' could be recovered.
Are you sure these files should be here?
Native code (.so) usage 'System.loadLibrary();' is found.
WebView with 'handler.proceed();' allows connection to continue even if the SSL certificate validation is failed.
Check certificate validation. Do not create or redefine X509Certificate class methods by yourself, if you don't understand risks. Use the existing API.
Files created with these methods could be worldwide readable.
Everyone can use it to access your resources.
The app should be compliant with open source license requirements.
WebView 'addJavascriptInterface' could be used to control the host app with JavaScript bindings. Remote Code Execution (RCE) is possible.
WebView 'setJavaScriptEnabled(true)' could be exploited during cross-site scripting attacks.
Control of WebView context allows to access local files.
Other applications could access the interfaces.
SD-cards and other external storages have 'worldwide read' policy.
Code for 'DexClassLoader' could be tampered.
CPE | Name | Operator | Version |
---|---|---|---|
slots free - big win casino™ | le | 1.27 |