Lucene search

K
hackappHackapp.orgHACKAPP:COM.FSP.ANDROID.C.APK
HistoryApr 01, 2016 - 9:37 a.m.

GPS Phone Tracker Pro - AWS Credentials, Customized SSL, Dangerous filesystem permissions vulnerabilities

2016-04-0109:37:41
Hackapp.org
hackapp.com
13

HackApp vulnerability scanner discovered that application GPS Phone Tracker Pro published at the β€˜play’ market has multiple vulnerabilities.

Name

GPS Phone Tracker Pro

Vendor

Family Safety Production

Link

COM.FSP.ANDROID.C.APK

Store

play

Version

Varies with device
  • MEDIUM
  • Exported components

    Other applications could access the interfaces.

  • WebView JavaScript enabled

    WebView 'setJavaScriptEnabled(true)' could be exploited during cross-site scripting attacks.

  • Dynamic Code Loading

    Code for 'DexClassLoader' could be tampered.

  • SQLite database found

    Check VACUUM cleaning.

  • WebView files access

    Control of WebView context allows to access local files.

  • SD-card access

    SD-cards and other external storages have 'worldwide read' policy.

  • NOTICE
  • Unsafe deleting

    All items deleted with 'file.delete()' could be recovered.

  • Corrupted files

    Can't parse these files. Corrupted? Check manually.

  • External URLs

    Where do they point?

  • Suspicious files

    Are you sure these files should be here?

  • KeyStore usage

    The app uses Android KeyStore subsystem.

  • CRITICAL
  • Customized SSL

    Check certificate validation. Do not create or redefine X509Certificate class methods by yourself, if you don't understand risks. Use the existing API.

  • Redefined SSL Common Names verifier

    This app uses self defined certificate verifier. If it is not properly configured it could allow attackers to do MITM attacks with their valid certificate without your knowledge.

  • WebView code execution

    WebView 'addJavascriptInterface' could be used to control the host app with JavaScript bindings. Remote Code Execution (RCE) is possible.

  • Dangerous filesystem permissions

    Files created with these methods could be worldwide readable.

  • AWS Credentials

    Everyone can use it to access your resources.