Information Gathering / APK Files List

Mobile AppAndroid


APK files list is an Information Gathering vulnerability (CWE-200) that occurs in Mobile App and Android. It is a vulnerability that allows an attacker to view the list of installed applications on a user's device. This can be used in a variety of ways to gain further access to the device, as well as gain an understanding of the user's behavior. The OWASP Testing Guide lists this vulnerability as one of the top 10 mobile risks, as it is easily exploitable without the user's knowledge.


APK files list can be used by an attacker to gain access to sensitive information stored on a user's device. It can also be used to gain access to other applications, or to see if the user has a particular application installed. The attacker can also collect data about the user's behavior and preferences.


The best solution to this vulnerability is to limit access to the list of APK files on the user's device. This can be done by implementing app permission controls that restrict access to the APK files. Additionally, developers should ensure that all their apps are properly tested and updated regularly to ensure the security of user data.


The following code shows an example of a vulnerability in the Android package manager, which can be used to list installed packages on the device:

PackageManager pm = getPackageManager();
List<ApplicationInfo> packages = pm.getInstalledApplications(PackageManager.GET_META_DATA);

for (ApplicationInfo packageInfo : packages) {
   Log.d("Packages", "Package Name : " + packageInfo.packageName);

Curious? Convinced? Interested?

Arrange a no-obligation consultation with one of our product experts today.