Intentionally vulnerable webview implementions in Android
- Basic webview hijack with attacker controlled URL in
RegistrationWebView.java - User token leaked to attacker via header and JavaScript interface in
SupportWebView.java - Universal file access allowed in
RegistrationWebView.javaenables exfiltration of private files - Webview ignore SSL certification checking.
- If you want, you can clone this repository into Android Studio, or you can simply download the
app.apkand install it on your device.