<alibaba_security_jaq_app_riskdetail_get_response>
<result>
<fake_info>
<fake_app_count>157</fake_app_count>
<fake_app_details>
<fake_app_detail>
<app_name>手机淘宝</app_name>
<download_urls>
<string>http://***xxx.com/aaa.apk</string>
<string>http://***yyy.com/bbb.apk</string>
</download_urls>
<infected_users>5000</infected_users>
<package_name>com.dm.taobao</package_name>
</fake_app_detail>
</fake_app_details>
<status>1</status>
<total_infected_users>1232300</total_infected_users>
</fake_info>
<malware_info>
<malware_count>
<high_level>1</high_level>
<low_level>0</low_level>
<total>1</total>
<weak_level>1</weak_level>
</malware_count>
<malware_details>
<malware_detail>
<description>该软件非官方软件,可能会对您的手机造成一定的风险,请您谨慎使用。</description>
<level>High</level>
<name>A.H.Fak.Alipay</name>
<type>盗版软件</type>
</malware_detail>
</malware_details>
<status>1</status>
</malware_info>
<plugin_info>
<plugin_count>1</plugin_count>
<plugin_details>
<plugin_detail>
<actions>
<string>读取地理位置信息</string>
</actions>
<company>baidu</company>
<desc>百度广告插件,可读取设备信息,可能泄露您的个人隐私</desc>
<name>BaiduAd</name>
<types>
<string>插屏广告</string>
</types>
<path>广告插件路径: com/baidu/mobads/</path>
</plugin_detail>
</plugin_details>
<status>1</status>
</plugin_info>
<task_status>1</task_status>
<vuln_info>
<status>1</status>
<vuln_count>
<high_level>10</high_level>
<low_level>4</low_level>
<mid_level>6</mid_level>
<red_line>7</red_line>
<total>20</total>
</vuln_count>
<vuln_details>
<vuln_detail>
<count>2</count>
<level>high</level>
<locations>
<string>Lcom/alibaba/wireless/jaq/vulnerabilities/VulnOpenFileMode#openFileWriteMode</string>
<string>Lcom/alibaba/wireless/jaq/vulnerabilities/VulnOpenFileMode#openFileReadMode</string>
</locations>
<name>File任意读写漏洞</name>
<recommendation>不要使用MODE_WORLD_READABLE和MODE_WORLD_WRITABLE</recommendation>
<red_line>false</red_line>
<referenct_link>http://jaq.alibaba.com/blog.htm?id=58</referenct_link>
<vuln_id>1</vuln_id>
<description>从全局可读写(如SD卡)的位置加载的DEX文件存在风险,在版本较低的情况下,任何人都可以读写SD卡上的内容,进而造成文件被替换的风险</description>
</vuln_detail>
</vuln_details>
<task_error_code>0</task_error_code>
<task_error_msg>success</task_error_msg>
</vuln_info>
</result>
</alibaba_security_jaq_app_riskdetail_get_response>
{
"alibaba_security_jaq_app_riskdetail_get_response":{
"result":{
"fake_info":{
"fake_app_count":157,
"fake_app_details":{
"fake_app_detail":[
{
"app_name":"手机淘宝",
"download_urls":{
"string":[
"http:\/\/***xxx.com\/aaa.apk",
"http:\/\/***yyy.com\/bbb.apk"
]
},
"infected_users":5000,
"package_name":"com.dm.taobao"
}
]
},
"status":1,
"total_infected_users":1232300
},
"malware_info":{
"malware_count":{
"high_level":1,
"low_level":0,
"total":1,
"weak_level":1
},
"malware_details":{
"malware_detail":[
{
"description":"该软件非官方软件,可能会对您的手机造成一定的风险,请您谨慎使用。",
"level":"High",
"name":"A.H.Fak.Alipay",
"type":"盗版软件"
}
]
},
"status":1
},
"plugin_info":{
"plugin_count":1,
"plugin_details":{
"plugin_detail":[
{
"actions":{
"string":[
"读取地理位置信息"
]
},
"company":"baidu",
"desc":"百度广告插件,可读取设备信息,可能泄露您的个人隐私",
"name":"BaiduAd",
"types":{
"string":[
"插屏广告"
]
},
"path":"广告插件路径: com\/baidu\/mobads\/"
}
]
},
"status":1
},
"task_status":1,
"vuln_info":{
"status":1,
"vuln_count":{
"high_level":10,
"low_level":4,
"mid_level":6,
"red_line":7,
"total":20
},
"vuln_details":{
"vuln_detail":[
{
"count":2,
"level":"high",
"locations":{
"string":[
"Lcom\/alibaba\/wireless\/jaq\/vulnerabilities\/VulnOpenFileMode#openFileWriteMode",
"Lcom\/alibaba\/wireless\/jaq\/vulnerabilities\/VulnOpenFileMode#openFileReadMode"
]
},
"name":"File任意读写漏洞",
"recommendation":"不要使用MODE_WORLD_READABLE和MODE_WORLD_WRITABLE",
"red_line":false,
"referenct_link":"http:\/\/jaq.alibaba.com\/blog.htm?id=58",
"vuln_id":"1",
"description":"从全局可读写(如SD卡)的位置加载的DEX文件存在风险,在版本较低的情况下,任何人都可以读写SD卡上的内容,进而造成文件被替换的风险"
}
]
},
"task_error_code":"0",
"task_error_msg":"success"
}
}
}
}