Lucene search

K
hackappHackapp.orgHACKAPP:COM.GAMES2WIN.FASHIONHOUSE.APK
HistoryApr 01, 2016 - 10:04 a.m.

Fashion House - AWS Credentials, Customized SSL, Dangerous filesystem permissions vulnerabilities

2016-04-0110:04:05
Hackapp.org
hackapp.com
8

HackApp vulnerability scanner discovered that application Fashion House published at the β€˜play’ market has multiple vulnerabilities.

Name

Fashion House

Vendor

Games2win.com

Link

COM.GAMES2WIN.FASHIONHOUSE.APK

Store

play

Version

1.7
  • MEDIUM
  • SD-card access

    SD-cards and other external storages have 'worldwide read' policy.

  • WebView JavaScript enabled

    WebView 'setJavaScriptEnabled(true)' could be exploited during cross-site scripting attacks.

  • Dynamic Code Loading

    Code for 'DexClassLoader' could be tampered.

  • WebView files access

    Control of WebView context allows to access local files.

  • CRITICAL
  • AWS Credentials

    Everyone can use it to access your resources.

  • Dangerous filesystem permissions

    Files created with these methods could be worldwide readable.

  • WebView SSL handling enabled

    WebView with 'handler.proceed();' allows connection to continue even if the SSL certificate validation is failed.

  • WebView code execution

    WebView 'addJavascriptInterface' could be used to control the host app with JavaScript bindings. Remote Code Execution (RCE) is possible.

  • Customized SSL

    Check certificate validation. Do not create or redefine X509Certificate class methods by yourself, if you don't understand risks. Use the existing API.

  • Redefined SSL Common Names verifier

    This app uses self defined certificate verifier. If it is not properly configured it could allow attackers to do MITM attacks with their valid certificate without your knowledge.

  • NOTICE
  • Native code usage

    Native code (.so) usage 'System.loadLibrary();' is found.

  • Suspicious files

    Are you sure these files should be here?

  • External URLs

    Were do they point?

  • Unsafe deleting

    All items deleted with 'file.delete()' could be recovered.

CPENameOperatorVersion
fashion housele1.7