HackApp vulnerability scanner discovered that application فضفض - شات و دردشه مع مجهول published at the ‘play’ market has multiple vulnerabilities.
All items deleted with 'file.delete()' could be recovered.
This app is looking for root tools.
Were do they point?
Are you sure these files should be here?
Files created with these methods could be worldwide readable.
Check certificate validation. Do not create or redefine X509Certificate class methods by yourself, if you don't understand risks. Use the existing API.
The app should be compliant with open source license requirements.
WebView 'addJavascriptInterface' could be used to control the host app with JavaScript bindings. Remote Code Execution (RCE) is possible.
WebView 'setJavaScriptEnabled(true)' could be exploited during cross-site scripting attacks.
Other applications could access the interfaces.
Control of WebView context allows to access local files.
SD-cards and other external storages have 'worldwide read' policy.
Code for 'DexClassLoader' could be tampered.
CPE | Name | Operator | Version |
---|---|---|---|
فضفض - شات و دردشه مع مجهول | le | 1.3.5 |