it means that it can be accessed by any third-party apps installed on the same device. On the newest Androids it also could be exploited by Android Instant Apps directly from a web-browser.
In file can see that it opens attacker provided URLs
It's dangerous because user doesn't see real URL. Attacker can open anything and specify any title (like "IRCCloud: Login Required"), and using that trick steal user credentials.
Jan 17th, 2019
Game: Cat Runner (Android)
Sep 14th, 2018
Company: blockchain.com
Summary
If the wallet's owner lost their device, their credential will be definitely exposed to the risk. The attackers can easily obtain their credentials such as password and other wallet's information.
Vulnerability details
The sensitive data stored in shared_prefs folder including pin_key, encrypted password and other information of user's wallet. The encrypted pass word is crack-able when the Stack Protection is not enable which will open up the opportunity for the attackers to reverse the code and find out what hash function is being used.
Proof of concept
Installed Blockchain wallet app on Bluestack
Logged on with an authenticated account
Using adb to connect with the device via Terminal
The user's credential stored in /data/data/piuk.blockchain.android/shared_prefs/piuk.blockchain.android_preferences.xml
5.Obtain the encrypted user's password and pin_key
6.Stack Protection is not enabled ,so started reversing the code and look for what hash function is being used to encrypt the password
For password: the encryption function resides in public final class DoubleEncryptionFactory
Impact
The attacker might be able to steal the password and later decrypt it.