Lucene search

K
hackappHackapp.orgHACKAPP:COM.PARROT.MINIKITNEO2.ANDROID.APK
HistoryApr 01, 2016 - 9:31 a.m.

Parrot MINIKIT Neo 2 - Customized SSL, Dynamic Code Loading, External URLs vulnerabilities

2016-04-0109:31:52
Hackapp.org
hackapp.com
8

HackApp vulnerability scanner discovered that application Parrot MINIKIT Neo 2 published at the β€˜play’ market has multiple vulnerabilities.

Name

Parrot MINIKIT Neo 2

Vendor

Parrot SA

Link

COM.PARROT.MINIKITNEO2.ANDROID.APK

Store

play

Version

1.1
  • MEDIUM
  • Dynamic Code Loading

    Code for 'DexClassLoader' could be tampered.

  • WebView files access

    Control of WebView context allows to access local files.

  • WebView JavaScript enabled

    WebView 'setJavaScriptEnabled(true)' could be exploited during cross-site scripting attacks.

  • NOTICE
  • External URLs

    Were do they point?

  • Unsafe deleting

    All items deleted with 'file.delete()' could be recovered.

  • Suspicious files

    Are you sure these files should be here?

  • CRITICAL
  • Customized SSL

    Check certificate validation. Do not create or redefine X509Certificate class methods by yourself, if you don't understand risks. Use the existing API.

CPENameOperatorVersion
parrot minikit neo 2le1.1