HackApp vulnerability scanner discovered that application Fashion House published at the βplayβ market has multiple vulnerabilities.
SD-cards and other external storages have 'worldwide read' policy.
WebView 'setJavaScriptEnabled(true)' could be exploited during cross-site scripting attacks.
Code for 'DexClassLoader' could be tampered.
Control of WebView context allows to access local files.
Everyone can use it to access your resources.
Files created with these methods could be worldwide readable.
WebView with 'handler.proceed();' allows connection to continue even if the SSL certificate validation is failed.
WebView 'addJavascriptInterface' could be used to control the host app with JavaScript bindings. Remote Code Execution (RCE) is possible.
Check certificate validation. Do not create or redefine X509Certificate class methods by yourself, if you don't understand risks. Use the existing API.
This app uses self defined certificate verifier. If it is not properly configured it could allow attackers to do MITM attacks with their valid certificate without your knowledge.
Native code (.so) usage 'System.loadLibrary();' is found.
Are you sure these files should be here?
Were do they point?
All items deleted with 'file.delete()' could be recovered.
CPE | Name | Operator | Version |
---|---|---|---|
fashion house | le | 1.7 |