Lucene search

K
hackappHackapp.orgHACKAPP:COM.KSSPORT.IPTV.APK
HistoryMay 20, 2017 - 8:09 p.m.

KSPORT IPTV - Base64 encoded String, Customized SSL, Dangerous filesystem permissions vulnerabilities

2017-05-2020:09:41
Hackapp.org
hackapp.com
113

HackApp vulnerability scanner discovered that application KSPORT IPTV published at the β€˜play’ market has multiple vulnerabilities.

Name

KSPORT IPTV

Vendor

KSPORT IPTV

Link

COM.KSSPORT.IPTV.APK

Store

play

Version

0.8.08.05
  • MEDIUM
  • Runtime command execution

    Function 'Runtime.getRuntime().exec()' is used, please check where variables are come from.

  • WebView files access

    Control of WebView context allows to access local files.

  • Exported components

    Other applications could access the interfaces.

  • WebView JavaScript enabled

    WebView 'setJavaScriptEnabled(true)' could be exploited during cross-site scripting attacks.

  • SD-card access

    SD-cards and other external storages have 'worldwide read' policy.

  • CRITICAL
  • Customized SSL

    Check certificate validation. Do not create or redefine X509Certificate class methods by yourself, if you don't understand risks. Use the existing API.

  • Runtime privilege escalation

    Privilege escalation 'Runtime.getRuntime().exec("su")' is found.

  • Base64 encoded String

    Base64 encoded string could include authentication credentials.

  • Dangerous filesystem permissions

    Files created with these methods could be worldwide readable.

  • WebView SSL handling enabled

    WebView with 'handler.proceed();' allows connection to continue even if the SSL certificate validation is failed.

  • WebView code execution

    WebView 'addJavascriptInterface' could be used to control the host app with JavaScript bindings. Remote Code Execution (RCE) is possible.

  • NOTICE
  • External URLs

    Were do they point?

  • KeyStore usage

    The app uses Android KeyStore subsystem.

  • Suspicious files

    Are you sure these files should be here?

  • Unsafe deleting

    All items deleted with 'file.delete()' could be recovered.

  • Possible privilege escalation

    This app is looking for root tools.

CPENameOperatorVersion
ksport iptvle0.8.08.05