I'm currently checking the logs an Android app creates. There, I found an interesting entry: In android's
/data/data/app.being.checked/cache/ok_http_cache_dir
There are quite a lot of files and there are entries where an attacker could easily read the user's
- E-Mail address
- First name
- Customer Id
These files persist even after logging out, exiting the app and restarting the phone.
Now the question remains: Is this a vulnerability which an real-world attacker would use to gain access to the user's data or would it take too much effort to do so, because he has to gain access to the user's phone, root it and then read the files or use a malicious program if the phone is already rooted.
I'm asking because I'm currently checking the app in scope of a bug bounty program and it specifies that any vulnerabilities have to be usable in a real-world scenario to do damage (including getting access to sensitive data) to a user. Would this qualify for such a program?