vulners.com
Open in
urlscan Pro
172.67.39.118
Public Scan
URL:
https://vulners.com/hackapp/HACKAPP:COM.DIB.APP.APK
Submission: On July 06 via manual from AE — Scanned from DE
Submission: On July 06 via manual from AE — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Lucene search * Basic search * Lucene search * Search by product -------------------------------------------------------------------------------- Subscribe CTRLK Start 30-day trial Database Vendors Products Years CVSS Scanner Agent Scanning API Scanning Manual Audit Perimeter Scanner Scanning Projects Email Webhook Plugins Resources Documents Blog Glossary FAQ Pricing Contacts About Us Partners Branding Guideline SIGN IN Hackapp.orgHACKAPP:COM.DIB.APP.APK HistoryDec 28, 2016 - 1:53 p.m. -------------------------------------------------------------------------------- 1. Vulners 2. / 3. Hackapp 4. / 5. DIB MOBILE - Customized SSL, Dangerous filesystem permissions, Redefined SSL Common Names verifier vulnerabilities DIB MOBILE - CUSTOMIZED SSL, DANGEROUS FILESYSTEM PERMISSIONS, REDEFINED SSL COMMON NAMES VERIFIER VULNERABILITIES 2016-12-2813:53:58 Hackapp.org hackapp.com 25 JSON HackApp vulnerability scanner discovered that application DIB MOBILE published at the ‘play’ market has multiple vulnerabilities. NAME DIB MOBILE VENDOR Dubai Islamic Bank LINK COM.DIB.APP.APK STORE play VERSION 3.0.10 * CRITICAL Redefined SSL Common Names verifier This app uses self defined certificate verifier. If it is not properly configured it could allow attackers to do MITM attacks with their valid certificate without your knowledge. Customized SSL Check certificate validation. Do not create or redefine X509Certificate class methods by yourself, if you don't understand risks. Use the existing API. Dangerous filesystem permissions Files created with these methods could be worldwide readable. WebView code execution WebView 'addJavascriptInterface' could be used to control the host app with JavaScript bindings. Remote Code Execution (RCE) is possible. * MEDIUM WebView JavaScript enabled WebView 'setJavaScriptEnabled(true)' could be exploited during cross-site scripting attacks. SD-card access SD-cards and other external storages have 'worldwide read' policy. WebView files access Control of WebView context allows to access local files. Runtime command execution Function 'Runtime.getRuntime().exec()' is used, please check where variables are come from. Dynamic Code Loading Code for 'DexClassLoader' could be tampered. * NOTICE Unsafe deleting All items deleted with 'file.delete()' could be recovered. External URLs Were do they point? Possible privilege escalation This app is looking for root tools. Suspicious files Are you sure these files should be here? Native code usage Native code (.so) usage 'System.loadLibrary();' is found. Software CPENameOperatorVersiondib mobilele3.0.10 REFERENCES play.google.com/store/apps/details?id=com.dib.app&hl=en Solutions * Vulnerabilities intelligence * Perimeter control tool * Linux scanner * Windows scanner * Developers SDK * Security Intelligence feeds Database * Vulnerabilities * Exploits * Security News * BugBounty * Wild Exploited * Top Vulnerabilities * CVE Feed Resources * Statics & Sources * Plugins * API docs * FAQ * Blog * Glossary Company * About * Contacts * Pricing * EULA * Privacy Policy * Submission Policy * OpenSource @2024 Vulners Inc JSON