ID HACKAPP:COM.SIGMAGAME.BEEBUBBLE.APK
Type hackapp
Reporter Hackapp.org
Modified 2016-04-01T10:01:11
Description
HackApp vulnerability scanner discovered that application Bee Bubble published at the 'play' market has multiple vulnerabilities.
{"published": "2016-04-01T10:01:11", "id": "HACKAPP:COM.SIGMAGAME.BEEBUBBLE.APK", "cvss": {"score": 0.0, "vector": "NONE"}, "history": [], "enchantments": {"vulnersScore": 7.5}, "hash": "27deef588df15cfe2c2ea53d3d3e84cfbcf0784feec4a223f7d13b0350297003", "description": "HackApp vulnerability scanner discovered that application Bee Bubble published at the 'play' market has multiple vulnerabilities.", "type": "hackapp", "lastseen": "2016-09-26T20:43:32", "edition": 1, "hackapp": {"version": "2.3", "store": "play", "release": "2015-12-15T00:00:00", "apk": "COM.SIGMAGAME.BEEBUBBLE.APK", "name": "Bee Bubble", "icon": "http://lh5.ggpht.com/DTyZHlkt7iT2jADNwD8f8j6Q30xM-Ck6DYqwc8jrhLZodKTRSyBu-ReMuQx5sRo-4SM=w300", "link": "https://play.google.com/store/apps/details?id=com.sigmagame.beebubble&hl=en", "vendor": "Sigma Game", "bugs": [{"name": "Native code usage", "id": "c02d1f9e8541e8f46844b948b04caf70", "severity": "notice", "description": "Native code (.so) usage 'System.loadLibrary();' is found."}, {"name": "Unsafe deleting", "id": "23d1170b7c6195c9194f6b6410bf86ce", "severity": "notice", "description": "All items deleted with 'file.delete()' could be recovered."}, {"name": "Dangerous filesystem permissions", "id": "33fc81d242cb768ef93c8340cd00996a", "severity": "critical", "description": "Files created with these methods could be worldwide readable."}, {"name": "External URLs", "id": "ad17fdc91f87b3b7216f157718ca4cf7", "severity": "notice", "description": "Were do they point?"}, {"name": "Base64 encoded String", "id": "59b591dcad8a6b7498b81db75af85f46", "severity": "critical", "description": "Base64 encoded string could include authentication credentials."}, {"name": "Exported components", "id": "64aa8077b4f20eaaf53271d8e8ee6504", "severity": "medium", "description": "Other applications could access the interfaces."}, {"name": "WebView code execution", "id": "71e3b906eb62fc505821858978649d3f", "severity": "critical", "description": "WebView 'addJavascriptInterface' could be used to control the host app with JavaScript bindings. Remote Code Execution (RCE) is possible."}, {"name": "Base64 encoded URLs", "id": "b2e3b577bbf9e4db310b7b15037e1bf2", "severity": "medium", "description": "Base64 encoded URLs are found."}, {"name": "SD-card access", "id": "2b965d956c65bcb8d62840e39a6ddd0a", "severity": "medium", "description": "SD-cards and other external storages have 'worldwide read' policy."}, {"name": "Dynamic Code Loading", "id": "87fc01ab36476a7936b84d7a5898a970", "severity": "medium", "description": "Code for 'DexClassLoader' could be tampered."}, {"name": "WebView files access", "id": "631fec2ab39318ca46abc69906da9ec2", "severity": "medium", "description": "Control of WebView context allows to access local files.\n\t\t\t"}, {"name": "Suspicious files", "id": "011f182afec93dc087325f0845bc262f", "severity": "notice", "description": "Are you sure these files should be here?"}, {"name": "WebView JavaScript enabled", "id": "573dca8367e9e9dcb45e23aaf7eb7887", "severity": "medium", "description": "WebView 'setJavaScriptEnabled(true)' could be exploited during cross-site scripting attacks."}]}, "title": "Bee Bubble - Base64 encoded String, Dangerous filesystem permissions, WebView code execution vulnerabilities", "href": "https://hackapp.com/report/58466032503576aa4ab38b6452ff79de", "modified": "2016-04-01T10:01:11", "bulletinFamily": "software", "viewCount": 0, "cvelist": [], "affectedSoftware": [{"version": "2.3", "name": "Bee Bubble", "operator": "le"}], "references": ["https://play.google.com/store/apps/details?id=com.sigmagame.beebubble&hl=en"], "reporter": "Hackapp.org", "hashmap": [{"hash": "e7587149d02189ab8ce3a6ce558c6fdb", "key": "affectedSoftware"}, {"hash": "f9fa10ba956cacf91d7878861139efb9", "key": "bulletinFamily"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "d4be9c4fc84262b4f39f89565918568f", "key": "cvss"}, {"hash": "49d7abdd5dceb7c95677dc280e5536e5", "key": "description"}, {"hash": "894a8f3f428cab98c0ee831ea522b0b5", "key": "hackapp"}, {"hash": "eeeb8fc6bb80e04a0e880211f6a3b4e0", "key": "href"}, {"hash": "c3d331a33fb16f696fd852ce4c78ba15", "key": "modified"}, {"hash": "56765472680401499c79732468ba4340", "key": "objectVersion"}, {"hash": "c3d331a33fb16f696fd852ce4c78ba15", "key": "published"}, {"hash": "b92b8223736a0debc55d74b6f53239af", "key": "references"}, {"hash": "3b012aae1848bb95fe11f3cebae83cb0", "key": "reporter"}, {"hash": "7d8818d173b082449bf965e7d7d806d3", "key": "title"}, {"hash": "96e87ef1fcc8d9d3cdd337488987c423", "key": "type"}, {"hash": "cfcd208495d565ef66e7dff9f98764da", "key": "viewCount"}], "objectVersion": "1.2"}
{"result": {}}