Skip to content

Commit 6b4df70

Browse files
authored
Merge pull request #60 from payatu/banditVedant-patch-1
Update README.md
2 parents 91940e0 + 178045f commit 6b4df70

File tree

1 file changed

+36
-32
lines changed

1 file changed

+36
-32
lines changed

README.md

Lines changed: 36 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -36,71 +36,75 @@ What's more exciting? Stay in sync with the evolving landscape! BugBazaar regula
3636
## ⚠️Vulnerabilities
3737

3838
### WEBVIEW
39+
- Opening arbitrary URLs in the webview
3940
- XSS
4041
- OPEN REDIRECTION
41-
- Stealing User token Via javascript Interface
42+
- Account Takeover via Stealing Session ID (Host validation bypass)
43+
- Stealing User token Via JavaScriptInterface class
4244
- Access of Arbitrary files via insecure Flags
43-
- Stealing of Arbitrary files via Insecure `WebResourceResponse`
44-
- Account Takeover via Steal Session id
45+
- Note: Only exploitable until API level 28
46+
- Stealing of Arbitrary files via Insecure `WebResourceResponse`
4547

4648
### INTENT
4749
- Intent interception
4850
- Account takeover via intent Spoofing
4951
- Steal User's Contact via Insecure Pending Intent
5052
- RCE through insecure Dynamic Code Loading
51-
### Deep Link
52-
53-
- CSRF
54-
- Deep link hijacking
55-
- Content Spoofing
56-
- One Click Account Takeover
53+
54+
### Deep Link
55+
- CSRF to add the product to cart
56+
- Deep link hijacking to load URLs in webview
57+
- Content Spoofing on Offers activity
5758

5859
### IPC COMPONENTS
59-
6060
- Exported Components
6161
- Steal User's Contact via typo permission in Content Provider
62-
- Arbitrary data write to Content provider
63-
- Access to Protected Components via Recevier
62+
- Insecure broadcast receiver
63+
- Access to Protected Components via broadcast Receiver
64+
- Insecure services
65+
- Fragment injection in Refer-Us
6466

6567
### Injections
68+
- SQL Injection via user input in My order
69+
- Content Provider SQL Injection in Address
70+
- Data insertion via insecure Content Provider in Address
6671

67-
- SQL Injection via user input
68-
72+
### Unintended Data Leakage
73+
- Copy/Paste buffer Caching
74+
- Application backgrounding
75+
- Insecure Logging (logging user creds
6976

77+
### Insecure Storage
78+
- Unencrypted database
79+
- Man in the Disk Attack
80+
- Storing sensitive info in SharedPref
81+
- Hardcoded secrets
7082

7183
### OTHERS
72-
7384
- Improper Input Validation
74-
- Insecure Logging
75-
- Insecure Storage
7685
- Unrestricted file upload
77-
- Firebase Misconfiguration
86+
- Misconfigured firebase's firestore
7887
- Passcode Bypass
79-
- Copy paster Buffer
8088
- Tapjacking
81-
- hardcoded secrets
8289
- Improper exception Handling
83-
- Debuggable
90+
- Debuggable application
8491
- Backup enabled
8592
- Task Hijacking
86-
- Man in the Disk Attack
87-
93+
- Improper cache handling
8894

95+
### Runtime exploitation
96+
- Runtime code modification
97+
- Login pin bypass via Frida/Objection
8998

9099
### APP Protection
91-
92-
- EASY LEVEL
100+
- EASY LEVEL:
93101
- RootBear Library
94-
- MEDIUM LEVEL
95-
102+
- MEDIUM LEVEL:
96103
- Magisk detect
97104
- Emulator Check
98-
- FRIDA DETECTION
99-
100-
101-
- ADVANCE LEVEL - !!! IN PROGRESS WILL UPDATE IN NEXT RELEASE
105+
- FRIDA DETECTION
106+
- ADVANCE LEVEL - ⚠️IN PROGRESS WILL UPDATE IN UPCOMING Release⚠️
102107

103-
// MANY MORE BUGS !!! COMING SOON 😎
104108

105109
## Core Team
106110
| | | | | |

0 commit comments

Comments
 (0)