HackApp vulnerability scanner discovered that application Prague Travel Guide published at the ‘play’ market has multiple vulnerabilities.
Native code (.so) usage 'System.loadLibrary();' is found.
All items deleted with 'file.delete()' could be recovered.
This app is looking for root tools.
Were do they point?
Are you sure these files should be here?
WebView with 'handler.proceed();' allows connection to continue even if the SSL certificate validation is failed.
Files created with these methods could be worldwide readable.
WebView 'addJavascriptInterface' could be used to control the host app with JavaScript bindings. Remote Code Execution (RCE) is possible.
Check certificate validation. Do not create or redefine X509Certificate class methods by yourself, if you don't understand risks. Use the existing API.
Other applications could access the interfaces.
WebView 'setJavaScriptEnabled(true)' could be exploited during cross-site scripting attacks.
SD-cards and other external storages have 'worldwide read' policy.
Control of WebView context allows to access local files.
Code for 'DexClassLoader' could be tampered.
Check VACUUM cleaning.
CPE | Name | Operator | Version |
---|---|---|---|
prague travel guide | le | 3.15 |