HackApp vulnerability scanner discovered that application GLARAB published at the βplayβ market has multiple vulnerabilities.
The app should be compliant with open source license requirements.
Files created with these methods could be worldwide readable.
WebView 'addJavascriptInterface' could be used to control the host app with JavaScript bindings. Remote Code Execution (RCE) is possible.
Code for 'DexClassLoader' could be tampered.
Control of WebView context allows to access local files.
WebView 'setJavaScriptEnabled(true)' could be exploited during cross-site scripting attacks.
SD-cards and other external storages have 'worldwide read' policy.
Were do they point?
All items deleted with 'file.delete()' could be recovered.
Are you sure these files should be here?