আপনি যে পৃষ্ঠাটির জন্য অনুরোধ করেছেন সেটি বর্তমানে আপনার ভাষায় উপলভ্য নয়। আপনি পৃষ্ঠার নিচে অন্য কোনও ভাষা বেছে নিতে পারেন বা Google Chrome-এর বিল্ট-ইন অনুবাদ ফিচার ব্যবহার করে আপনার পছন্দের ভাষায় যেকোনও ওয়েবপৃষ্ঠা অবিলম্বে অনুবাদ করতে পারেন।

How to fix apps with the AdMarvel vulnerability

This information is intended for developers of apps that utilize any version of AdMarvel, an ad platform, that precedes 2.5.4. These versions contain a security vulnerability that puts user data at risk. Please migrate your app(s) to AdMarvel v2.5.4 or higher as soon as possible and increment the version number of the upgraded APK.​

What’s happening

Beginning May 9, 2016, Google Play started to block the publishing of any new apps or updates that use pre-2.5.4 versions of AdMarvel.Please refer to the notice on your Play ConsoleAfter the deadlines shown in your Play Console, any apps that contain unfixed security vulnerabilities may be removed from Google Play.

Action required​

  1. Sign in to your Play Console, and navigate to the Alerts section to see which apps are affected and the deadlines to resolve these issues.
  2. Update your affected apps and fix the vulnerability.
  3. Submit the updated versions of your affected apps.

Upon resubmission, your app will be reviewed again. This process can take several hours. If the app passes review and is published successfully, then no further action is required. If the app fails review, then the new app version will not be published and you will receive an email notification.

Additional details

The vulnerability was addressed in AdMarvel 2.5.4. The latest versions of the AdMarvel SDK can be downloaded from your AdMarvel dashboard. You can confirm the version number by checking in AdMarvelUtils class. If you’re using a 3rd party library that bundles AdMarvel, you’ll need to upgrade it to a version that bundles AdMarvel 2.5.4 or later.

If you need more information, you can contact AdMarvel support by emailing adsupport@admarvel.com, or post to Stack Overflow and use the tags “android-security” and “AdMarvel.”

The vulnerability is due to permissive WebView settings that explicitly enable setAllowUniversalAccessFromFileURLs boolean flag. An attacker may exploit this vulnerability by serving a malicious JavaScript code in an advertising creative, making it possible to access local resources on the devices. For other technical questions, you can post to Stack Overflow and use the tags “android-security” and “AdMarvel.”

While these specific issues may not affect every app that uses AdMarvel, it’s best to stay up to date on all security patches. Apps with vulnerabilities that expose users to risk of compromise may be considered dangerous products in violation of the Content Policy and section 4.4 of the Developer Distribution Agreement.

Apps must also comply with the Developer Distribution Agreement and Content Policy

We’re here to help

If you have technical questions about the vulnerability, you can post to Stack Overflow and use the tag “android-security.” For clarification on steps you need to take to resolve this issue, you can contact our developer support team.

false
Main menu
1818859606250163665
true
সহায়তা কেন্দ্র সার্চ করুন
true
true
true
true
true
5016068
false
false