Open
Description
SDKs before 27 allow clear text (non-https) by default. This is a security vulnerability since the minimum SDK is 21.
Basically, it allows man-in-the-middle attacks.
Steps to reproduce:
- Identify an API being called in the app
- Poison the networks ARP with non-https
- Steal credentials
Expected behavior
All network traffic restricted to HTTPS
Screenshots
This is discussed more here: https://developer.android.com/privacy-and-security/risks/cleartext
Environment (please complete the following information):
- OS version: less than 27
- Device: any
- App Version: 0.3.1
Additional context
If no HTTPS becomes an issue for testing, we must add flavour configurations instead.
Metadata
Metadata
Assignees
Type
Projects
Status
Backlog