HackApp vulnerability scanner discovered that application FlashVPN Free VPN Proxy published at the βplayβ market has multiple vulnerabilities.
WebView with 'handler.proceed();' allows connection to continue even if the SSL certificate validation is failed.
Check certificate validation. Do not create or redefine X509Certificate class methods by yourself, if you don't understand risks. Use the existing API.
WebView 'addJavascriptInterface' could be used to control the host app with JavaScript bindings. Remote Code Execution (RCE) is possible.
Files created with these methods could be worldwide readable.
All items deleted with 'file.delete()' could be recovered.
Are you sure these files should be here?
Were do they point?
Native code (.so) usage 'System.loadLibrary();' is found.
Code for 'DexClassLoader' could be tampered.
Other applications could access the interfaces.
Control of WebView context allows to access local files.
SD-cards and other external storages have 'worldwide read' policy.
WebView 'setJavaScriptEnabled(true)' could be exploited during cross-site scripting attacks.
CPE | Name | Operator | Version |
---|---|---|---|
flashvpn free vpn proxy | le | 1.2.4 |