Home / Vulnerability Database / Android : WebView Misconfiguration
Android
Android : WebView Misconfiguration
Classification
OWASP MASVS
Overview
WebView is not configured with support for a minimum set of protocols (ideally https only). Support for potentially dangerous URL schemes (such as: file, tel and app-id) is not disabled.
Several default schemes are available for WebView interpretation, for example: * http(s):// * file:// * tel:// * ftp://
WebView can load remote content from an endpoint, but they can also load local content from the app data directory. If the local content is loaded, the user shouldn’t be able to influence the filename or the path used to load the file, and users shouldn’t be able to edit the loaded file. Thus, it is recommended to use other methods for loading local files or take recommended precautions.
References
MEDIUM
DerScanner Severity Score
Do you want to fix Android : WebView Misconfiguration in your application?
See also
Android
Android : Debug mode on
Android
Android : Error handling: generic exception
Android
