ID HACKAPP:COM.PLANNER5D.PLANNER5D.APK
Type hackapp
Reporter Hackapp.org
Modified 2016-04-01T09:06:13
Description
HackApp vulnerability scanner discovered that application Planner 5D - Interior Design published at the 'play' market has multiple vulnerabilities.
{"cvelist": [], "published": "2016-04-01T09:06:13", "bulletinFamily": "software", "objectVersion": "1.2", "href": "https://hackapp.com/report/17c55c42ffdf7f00f1b7acb68bb1bbda", "lastseen": "2016-09-26T20:43:32", "id": "HACKAPP:COM.PLANNER5D.PLANNER5D.APK", "hackapp": {"link": "https://play.google.com/store/apps/details?id=com.planner5d.planner5d&hl=en", "bugs": [{"description": "Are you sure these files should be here?", "severity": "notice", "id": "000e6be73c953c61cb68a2f17d2a5dfa", "name": "Suspicious files"}, {"description": "Were do they point?", "severity": "notice", "id": "d879deb90763c14ec882528129cdb26b", "name": "External URLs"}, {"description": "WebView with 'handler.proceed();' allows connection to continue even if the SSL certificate validation is failed.", "severity": "critical", "id": "1a3853eef2db228f2f3402b8373cc962", "name": "WebView SSL handling enabled"}, {"description": "All items deleted with 'file.delete()' could be recovered.", "severity": "notice", "id": "ecb88893d9a6b0e3d07bdbbc7349cc19", "name": "Unsafe deleting"}, {"description": "Check VACUUM cleaning.", "severity": "medium", "id": "82bf0e8592f3174f1b0e8e203b14c438", "name": "SQLite database found"}, {"description": "Can't parse these files. Corrupted? Check manually.", "severity": "notice", "id": "b755a8403ef993cc05e2caf1c1212846", "name": "Corrupted files"}, {"description": "Control of WebView context allows to access local files.\n\t\t\t", "severity": "medium", "id": "db89733adcf2bbbf45816f6a093a06dc", "name": "WebView files access"}, {"description": "WebView 'addJavascriptInterface' could be used to control the host app with JavaScript bindings. Remote Code Execution (RCE) is possible.", "severity": "critical", "id": "1daf7de95bdb75482f0500e816f3503d", "name": "WebView code execution"}, {"description": "This app is looking for root tools.", "severity": "notice", "id": "f5f9d4afb28f70b60feeb15e78af371c", "name": "Possible privilege escalation"}, {"description": "SD-cards and other external storages have 'worldwide read' policy.", "severity": "medium", "id": "f169ecae9404de2f9c3b07a356bce96f", "name": "SD-card access"}, {"description": "WebView 'setJavaScriptEnabled(true)' could be exploited during cross-site scripting attacks.", "severity": "medium", "id": "b50a1c8ad3963458b982d49a80a783a9", "name": "WebView JavaScript enabled"}, {"description": "Other applications could access the interfaces.", "severity": "medium", "id": "f7f26796ad52b06a3720199c1c2bae91", "name": "Exported components"}, {"description": "Native code (.so) usage 'System.loadLibrary();' is found.", "severity": "notice", "id": "81e40c3bce358776fd76fb6074a1a52a", "name": "Native code usage"}, {"description": "Files created with these methods could be worldwide readable.", "severity": "critical", "id": "bb0ca0f3169797cb2f051b33ec6e7dbc", "name": "Dangerous filesystem permissions"}], "vendor": "Planner 5D", "release": "2016-03-30T00:00:00", "version": "1.5.23", "apk": "COM.PLANNER5D.PLANNER5D.APK", "store": "play", "name": "Planner 5D - Interior Design", "icon": "http://lh3.googleusercontent.com/2rg3fddMWsHouO-t2VVwNAKwsRnzPpg6AUFOxFi5m8-M2LdUXfFA5sdsyJj4y58ew6E=w300"}, "reporter": "Hackapp.org", "references": ["https://play.google.com/store/apps/details?id=com.planner5d.planner5d&hl=en"], "hashmap": [{"hash": "00dabdfbd00a97af7438165b0bc6d086", "key": "affectedSoftware"}, {"hash": "f9fa10ba956cacf91d7878861139efb9", "key": "bulletinFamily"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "d4be9c4fc84262b4f39f89565918568f", "key": "cvss"}, {"hash": "57acd939ef30e6310a1499c5438dc43b", "key": "description"}, {"hash": "2c29a2a7ec279f0bcb1089aefae81204", "key": "hackapp"}, {"hash": "478d81e88b26382d991af82a62db1d6a", "key": "href"}, {"hash": "87fb26ea23e95de621a65b40b4c07d90", "key": "modified"}, {"hash": "56765472680401499c79732468ba4340", "key": "objectVersion"}, {"hash": "87fb26ea23e95de621a65b40b4c07d90", "key": "published"}, {"hash": "e20b5c650abc93937919d748cd632e9d", "key": "references"}, {"hash": "3b012aae1848bb95fe11f3cebae83cb0", "key": "reporter"}, {"hash": "9ccf781975873a1cfc2587b24fe168c2", "key": "title"}, {"hash": "96e87ef1fcc8d9d3cdd337488987c423", "key": "type"}, {"hash": "cfcd208495d565ef66e7dff9f98764da", "key": "viewCount"}], "description": "HackApp vulnerability scanner discovered that application Planner 5D - Interior Design published at the 'play' market has multiple vulnerabilities.", "modified": "2016-04-01T09:06:13", "cvss": {"vector": "NONE", "score": 0.0}, "viewCount": 1, "type": "hackapp", "affectedSoftware": [{"name": "Planner 5D - Interior Design", "operator": "le", "version": "1.5.23"}], "title": "Planner 5D - Interior Design - Dangerous filesystem permissions, WebView SSL handling enabled, WebView code execution vulnerabilities", "hash": "9a51ae00cc2a79e8fa1a5c9b29f0032ae4bfaa55a5ccf4fb02e88d2377da3dcd", "history": [], "edition": 1, "enchantments": {"vulnersScore": 4.3}}
{"result": {}}