HackApp vulnerability scanner discovered that application Indy Cat Match 3 published at the βplayβ market has multiple vulnerabilities.
SD-cards and other external storages have 'worldwide read' policy.
Control of WebView context allows to access local files.
WebView 'setJavaScriptEnabled(true)' could be exploited during cross-site scripting attacks.
Code for 'DexClassLoader' could be tampered.
Base64 encoded string could include authentication credentials.
WebView 'addJavascriptInterface' could be used to control the host app with JavaScript bindings. Remote Code Execution (RCE) is possible.
Files created with these methods could be worldwide readable.
WebView with 'handler.proceed();' allows connection to continue even if the SSL certificate validation is failed.
Native code (.so) usage 'System.loadLibrary();' is found.
Are you sure these files should be here?
Were do they point?
All items deleted with 'file.delete()' could be recovered.
CPE | Name | Operator | Version |
---|---|---|---|
indy cat match 3 | le | 1.2.09 |