HackApp vulnerability scanner discovered that application KSPORT IPTV published at the βplayβ market has multiple vulnerabilities.
Function 'Runtime.getRuntime().exec()' is used, please check where variables are come from.
Control of WebView context allows to access local files.
Other applications could access the interfaces.
WebView 'setJavaScriptEnabled(true)' could be exploited during cross-site scripting attacks.
SD-cards and other external storages have 'worldwide read' policy.
Check certificate validation. Do not create or redefine X509Certificate class methods by yourself, if you don't understand risks. Use the existing API.
Privilege escalation 'Runtime.getRuntime().exec("su")' is found.
Base64 encoded string could include authentication credentials.
Files created with these methods could be worldwide readable.
WebView with 'handler.proceed();' allows connection to continue even if the SSL certificate validation is failed.
WebView 'addJavascriptInterface' could be used to control the host app with JavaScript bindings. Remote Code Execution (RCE) is possible.
Were do they point?
The app uses Android KeyStore subsystem.
Are you sure these files should be here?
All items deleted with 'file.delete()' could be recovered.
This app is looking for root tools.
CPE | Name | Operator | Version |
---|---|---|---|
ksport iptv | le | 0.8.08.05 |