Home / Vulnerability Database / Android : WebView Misconfiguration
Android

Android : WebView Misconfiguration

Classification

Overview

WebView is not configured with support for a minimum set of protocols (ideally https only). Support for potentially dangerous URL schemes (such as: file, tel and app-id) is not disabled.

Several default schemes are available for WebView interpretation, for example: * http(s):// * file:// * tel:// * ftp://

WebView can load remote content from an endpoint, but they can also load local content from the app data directory. If the local content is loaded, the user shouldn’t be able to influence the filename or the path used to load the file, and users shouldn’t be able to edit the loaded file. Thus, it is recommended to use other methods for loading local files or take recommended precautions.

MEDIUM

DerScanner Severity Score

Do you want to fix Android : WebView Misconfiguration in your application?

See also

Android

Android : Debug mode on

Android

Android : Error handling: generic exception

Android

Android : HTTP usage