导航菜单

应用安全检测报告

应用安全检测报告,支持文件搜索、内容检索和AI代码分析

移动应用安全检测报告

应用图标

aeroLINE CREW v5.0.1

Android APK 12baf0d7...
56
安全评分

安全基线评分

56/100

低风险

综合风险等级

风险等级评定
  1. A
  2. B
  3. C
  4. F

应用存在一定安全风险,建议优化

漏洞与安全项分布

2 高危
12 中危
1 信息
3 安全

隐私风险评估

2
第三方跟踪器

中等隐私风险
检测到少量第三方跟踪器


检测结果分布

高危安全漏洞 2
中危安全漏洞 12
安全提示信息 1
已通过安全项 3
重点安全关注 0

高危安全漏洞 如果一个应用程序使用WebView.loadDataWithBaseURL方法来加载一个网页到WebView,那么这个应用程序可能会遭受跨站脚本攻击

如果一个应用程序使用WebView.loadDataWithBaseURL方法来加载一个网页到WebView,那么这个应用程序可能会遭受跨站脚本攻击
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05h-Testing-Platform-Interaction.md#static-analysis-7

Files:
com/reactnativecommunity/webview/RNCWebViewManager.java, line(s) 510,31,32

高危安全漏洞 应用程序使用带PKCS5/PKCS7填充的加密模式CBC。此配置容易受到填充oracle攻击。

应用程序使用带PKCS5/PKCS7填充的加密模式CBC。此配置容易受到填充oracle攻击。
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#identifying-insecure-andor-deprecated-cryptographic-algorithms-mstg-crypto-4

Files:
com/tectiv3/aes/RCTAes.java, line(s) 159,169

中危安全漏洞 应用已启用明文网络流量

[android:usesCleartextTraffic=true]
应用允许明文网络流量(如 HTTP、FTP 协议、DownloadManager、MediaPlayer 等)。API 级别 27 及以下默认启用,28 及以上默认禁用。明文流量缺乏机密性、完整性和真实性保护,攻击者可窃听或篡改传输数据。建议关闭明文流量,仅使用加密协议。

中危安全漏洞 Broadcast Receiver (io.invertase.firebase.messaging.ReactNativeFirebaseMessagingReceiver) 受权限保护,但应检查权限保护级别。

Permission: com.google.android.c2dm.permission.SEND [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Broadcast Receiver (com.google.firebase.iid.FirebaseInstanceIdReceiver) 受权限保护,但应检查权限保护级别。

Permission: com.google.android.c2dm.permission.SEND [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Service (androidx.work.impl.background.systemjob.SystemJobService) 受权限保护,但应检查权限保护级别。

Permission: android.permission.BIND_JOB_SERVICE [android:exported=true]
检测到  Service 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Broadcast Receiver (androidx.work.impl.diagnostics.DiagnosticsReceiver) 受权限保护,但应检查权限保护级别。

Permission: android.permission.DUMP [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Service (com.google.android.gms.auth.api.signin.RevocationBoundService) 受权限保护,但应检查权限保护级别。

Permission: com.google.android.gms.auth.api.signin.permission.REVOCATION_NOTIFICATION [android:exported=true]
检测到  Service 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 文件可能包含硬编码的敏感信息,如用户名、密码、密钥等

文件可能包含硬编码的敏感信息,如用户名、密码、密钥等
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#checking-memory-for-sensitive-data-mstg-storage-10

Files:
com/oblador/keychain/KeychainModule.java, line(s) 46,83,88
io/invertase/firebase/common/TaskExecutorService.java, line(s) 14,15
io/invertase/firebase/messaging/ReactNativeFirebaseMessagingHeadlessService.java, line(s) 13,11
io/invertase/firebase/messaging/ReactNativeFirebaseMessagingSerializer.java, line(s) 20
net/time4j/tz/spi/WinZoneProviderSPI.java, line(s) 26

中危安全漏洞 应用程序可以读取/写入外部存储器,任何应用程序都可以读取写入外部存储器的数据

应用程序可以读取/写入外部存储器,任何应用程序都可以读取写入外部存储器的数据
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#external-storage

Files:
com/RNFetchBlob/RNFetchBlobFS.java, line(s) 179,201,171,172,173,174,175,176,177,178,191,192,199,632
com/RNFetchBlob/Utils/PathResolver.java, line(s) 26
com/learnium/RNDeviceInfo/RNDeviceModule.java, line(s) 366
com/rnfs/RNFSManager.java, line(s) 932,840,921,923,926
io/invertase/firebase/utils/ReactNativeFirebaseUtilsModule.java, line(s) 114,125,126,127

中危安全漏洞 MD5是已知存在哈希冲突的弱哈希

MD5是已知存在哈希冲突的弱哈希
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#identifying-insecure-andor-deprecated-cryptographic-algorithms-mstg-crypto-4

Files:
com/RNFetchBlob/RNFetchBlobUtils.java, line(s) 23

中危安全漏洞 应用程序使用SQLite数据库并执行原始SQL查询。原始SQL查询中不受信任的用户输入可能会导致SQL注入。敏感信息也应加密并写入数据库

应用程序使用SQLite数据库并执行原始SQL查询。原始SQL查询中不受信任的用户输入可能会导致SQL注入。敏感信息也应加密并写入数据库
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04h-Testing-Code-Quality.md#injection-flaws-mstg-arch-2-and-mstg-platform-2

Files:
com/reactnativecommunity/asyncstorage/ReactDatabaseSupplier.java, line(s) 4,5,6,42

中危安全漏洞 应用程序包含隐私跟踪程序

此应用程序有多个2隐私跟踪程序。跟踪器可以跟踪设备或用户,是终端用户的隐私问题。

中危安全漏洞 此应用可能包含硬编码机密信息

从应用程序中识别出以下机密确保这些不是机密或私人信息
"google_api_key" : "AIzaSyANdVJuZhgIp0J6d911ZhSyTmFGck2LbhU"
"google_app_id" : "1:772560439909:android:9b5e99a5143c48911c948c"
"google_crash_reporting_api_key" : "AIzaSyANdVJuZhgIp0J6d911ZhSyTmFGck2LbhU"

安全提示信息 应用程序记录日志信息,不得记录敏感信息

应用程序记录日志信息,不得记录敏感信息
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#logs

Files:
br/com/classapp/RNSensitiveInfo/RNSensitiveInfoModule.java, line(s) 56,127,229
cl/json/RNShareModule.java, line(s) 235,239,247,258,263,277,292
cl/json/RNSharePathUtil.java, line(s) 48
cl/json/social/InstagramShare.java, line(s) 39,48
cl/json/social/SingleShareIntent.java, line(s) 27,30,39
com/RNFetchBlob/RNFetchBlobReq.java, line(s) 360
com/calendarevents/RNCalendarEvents.java, line(s) 428,625,108,112
com/henninghall/date_picker/DerivedData.java, line(s) 76
com/henninghall/date_picker/pickers/AndroidNative.java, line(s) 80,82,84
com/horcrux/svg/Brush.java, line(s) 140,150
com/horcrux/svg/ClipPathView.java, line(s) 33
com/horcrux/svg/ImageView.java, line(s) 139
com/horcrux/svg/LinearGradientView.java, line(s) 77
com/horcrux/svg/MaskView.java, line(s) 82
com/horcrux/svg/PatternView.java, line(s) 89
com/horcrux/svg/RadialGradientView.java, line(s) 91
com/horcrux/svg/UseView.java, line(s) 58,89,104
com/horcrux/svg/VirtualView.java, line(s) 370,301,335,339
com/imagepicker/ImageMetadata.java, line(s) 26
com/imagepicker/Metadata.java, line(s) 31
com/imagepicker/VideoMetadata.java, line(s) 40,72
com/learnium/RNDeviceInfo/RNDeviceModule.java, line(s) 212,292,401,406,522,557,650,833,912,916
com/learnium/RNDeviceInfo/RNInstallReferrerClient.java, line(s) 73,79,84,97,27,43,91
com/learnium/RNDeviceInfo/resolver/DeviceIdResolver.java, line(s) 20,23,24,28
com/oblador/keychain/KeychainModule.java, line(s) 444,456,138,162,165,168,189,202,205,208,256,259,274,314,317,131,136,410,507
com/oblador/keychain/cipherStorage/CipherStorageBase.java, line(s) 241,296,271,288,417
com/oblador/keychain/cipherStorage/CipherStorageFacebookConceal.java, line(s) 87
com/oblador/keychain/cipherStorage/CipherStorageKeystoreAesCbc.java, line(s) 134
com/oblador/keychain/cipherStorage/CipherStorageKeystoreRsaEcb.java, line(s) 120
com/oblador/keychain/decryptionHandler/DecryptionResultHandlerInteractiveBiometric.java, line(s) 110,117
com/oblador/keychain/decryptionHandler/DecryptionResultHandlerInteractiveBiometricManualRetry.java, line(s) 20,48,79
com/reactcommunity/rndatetimepicker/MinuteIntervalSnappableTimePickerDialog.java, line(s) 104
com/reactnativecommunity/asyncstorage/AsyncStorageModule.java, line(s) 154,193,207,221,239,244,249,284,289,309,337,351,365,379,390,395,411,429,459
com/reactnativecommunity/asyncstorage/ReactDatabaseSupplier.java, line(s) 89,92
com/reactnativecommunity/webview/RNCWebViewManager.java, line(s) 943,1016,189,202,932,948,975,1018
com/reactnativecommunity/webview/RNCWebViewModule.java, line(s) 300,305,329,334,217,241,255
com/swmansion/gesturehandler/react/RNGestureHandlerRootHelper.java, line(s) 36,50
com/swmansion/gesturehandler/react/RNGestureHandlerRootView.java, line(s) 35
com/swmansion/reanimated/nodes/DebugNode.java, line(s) 21
com/th3rdwave/safeareacontext/SafeAreaView.java, line(s) 74
com/vonovak/AddCalendarEventModule.java, line(s) 168,232,183,220
io/invertase/firebase/app/ReactNativeFirebaseApp.java, line(s) 16
io/invertase/firebase/common/RCTConvertFirebase.java, line(s) 109
io/invertase/firebase/common/ReactNativeFirebaseEventEmitter.java, line(s) 130
io/invertase/firebase/common/SharedUtils.java, line(s) 82,234,291,93
io/invertase/firebase/crashlytics/ReactNativeFirebaseCrashlyticsInitProvider.java, line(s) 20,23,26,28,39,42,45,47,58,61,64,66,78,75
io/invertase/firebase/crashlytics/ReactNativeFirebaseCrashlyticsModule.java, line(s) 53,56,71,145,154
io/invertase/firebase/messaging/ReactNativeFirebaseMessagingModule.java, line(s) 80
io/invertase/firebase/messaging/ReactNativeFirebaseMessagingReceiver.java, line(s) 21,42
io/invertase/firebase/utils/ReactNativeFirebaseUtilsModule.java, line(s) 71
net/time4j/android/ApplicationStarter.java, line(s) 106,55,59,85,101,102,103,104
net/time4j/base/ResourceLoader.java, line(s) 90,116
net/time4j/format/expert/ChronoFormatter.java, line(s) 500,541,590,594,1006,1033,1279,1285,563,588,591,950,953,1011,1026,1034,1148,1170,1176,1222,1303,1336
net/time4j/format/expert/CustomizedProcessor.java, line(s) 101,107
net/time4j/format/expert/FormatStep.java, line(s) 296
net/time4j/format/expert/IgnorableWhitespaceProcessor.java, line(s) 49
net/time4j/format/expert/Iso8601Format.java, line(s) 78,92
net/time4j/format/expert/LiteralProcessor.java, line(s) 113,152,294
net/time4j/format/expert/LocalizedGMTProcessor.java, line(s) 192,236,239,253,256,269,281,284,303,306,311,348,351
net/time4j/format/expert/LookupProcessor.java, line(s) 79,80,99,111,119
net/time4j/format/expert/MultiFormatParser.java, line(s) 37,50,65,35,48,54,63,69
net/time4j/format/expert/SkipProcessor.java, line(s) 75
net/time4j/format/expert/StyleProcessor.java, line(s) 79
net/time4j/format/expert/TextProcessor.java, line(s) 97,83,84,99,111,114
net/time4j/format/expert/TimezoneGenericProcessor.java, line(s) 121,143,184,189,192
net/time4j/format/expert/TimezoneIDProcessor.java, line(s) 44,59,63,68,73,78,94,100
net/time4j/format/expert/TimezoneNameProcessor.java, line(s) 116,142,213,230,232
net/time4j/i18n/WeekdataProviderSPI.java, line(s) 141
net/time4j/tz/spi/ZoneNameProviderSPI.java, line(s) 152

已通过安全项 此应用程序使用SSL Pinning 来检测或防止安全通信通道中的MITM攻击

此应用程序使用SSL Pinning 来检测或防止安全通信通道中的MITM攻击
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05g-Testing-Network-Communication.md#testing-custom-certificate-stores-and-certificate-pinning-mstg-network-4

Files:
com/RNFetchBlob/RNFetchBlobReq.java, line(s) 345,344,351,343,343

已通过安全项 此应用程序具有防止窃听攻击的功能

此应用程序具有防止窃听攻击的功能
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05h-Testing-Platform-Interaction.md#testing-for-overlay-attacks-mstg-platform-9

Files:
com/accelaero/aeroLINECREW/MainActivity.java, line(s) 15

已通过安全项 Firebase远程配置已禁用

Firebase远程配置URL ( https://firebaseremoteconfig.googleapis.com/v1/projects/772560439909/namespaces/firebase:fetch?key=AIzaSyANdVJuZhgIp0J6d911ZhSyTmFGck2LbhU ) 已禁用。响应内容如下所示:

{
    "state": "NO_TEMPLATE"
}

综合安全基线评分总结

应用图标

aeroLINE CREW v5.0.1

Android APK
56
综合安全评分
中风险