Lucene search

K
hackappHackapp.orgHACKAPP:COM.FSP.ANDROID.FRIENDLOCATOR.APK
HistoryApr 01, 2016 - 9:37 a.m.

Find My Friends! - AWS Credentials, Customized SSL, Dangerous filesystem permissions vulnerabilities

2016-04-0109:37:52
Hackapp.org
hackapp.com
5

HackApp vulnerability scanner discovered that application Find My Friends! published at the β€˜play’ market has multiple vulnerabilities.

Name

Find My Friends!

Vendor

Family Safety Production

Link

COM.FSP.ANDROID.FRIENDLOCATOR.APK

Store

play

Version

Varies with device
  • CRITICAL
  • Redefined SSL Common Names verifier

    This app uses self defined certificate verifier. If it is not properly configured it could allow attackers to do MITM attacks with their valid certificate without your knowledge.

  • WebView code execution

    WebView 'addJavascriptInterface' could be used to control the host app with JavaScript bindings. Remote Code Execution (RCE) is possible.

  • AWS Credentials

    Everyone can use it to access your resources.

  • Dangerous filesystem permissions

    Files created with these methods could be worldwide readable.

  • Customized SSL

    Check certificate validation. Do not create or redefine X509Certificate class methods by yourself, if you don't understand risks. Use the existing API.

  • MEDIUM
  • Exported components

    Other applications could access the interfaces.

  • SQLite database found

    Check VACUUM cleaning.

  • Dynamic Code Loading

    Code for 'DexClassLoader' could be tampered.

  • WebView JavaScript enabled

    WebView 'setJavaScriptEnabled(true)' could be exploited during cross-site scripting attacks.

  • WebView files access

    Control of WebView context allows to access local files.

  • SD-card access

    SD-cards and other external storages have 'worldwide read' policy.

  • NOTICE
  • KeyStore usage

    The app uses Android KeyStore subsystem.

  • Unsafe deleting

    All items deleted with 'file.delete()' could be recovered.

  • Suspicious files

    Are you sure these files should be here?

  • Corrupted files

    Can't parse these files. Corrupted? Check manually.

  • External URLs

    Where do they point?

CPENameOperatorVersion
find my friends!leVaries with device