Document Title: =============== MobileSpy Android|iPhone|W7P|sOS - Web Vulnerabilities References (Source): ==================== http://www.vulnerability-lab.com/get_content.php?id=140 Release Date: ============= 2012-05-15 Vulnerability Laboratory ID (VL-ID): ==================================== 140 Common Vulnerability Scoring System: ==================================== 7.1 Product & Service Introduction: =============================== Mobile Spy defines the latest in high-tech cell phone surveillance. This revolutionary software allows individuals to easily install monitoring software directly onto a compatible smartphone that you own or have the proper consent to monitor. Once the software is installed onto the phone to be monitored, it silently logs activity such as SMS messages and call information along with recording GPS locations every 30 minutes when a GPS signal is available. There no need to worry about being near the phone to view the activity after installation because activities are uploaded to a private account viewable using ANY web browser, even a Mac or phone web browser. Here s a diagram to help you visualize how this process works. This hybrid software gives you the ability to monitor your BlackBerry, iPhone, iPad, Android, Windows Mobile or Symbian OS based smartphone. Mobile Spy is the next generation of smartphone spy software. Do you suspect that your child or employee is abusing their SMS or vehicle privileges? If yes, then this software is ideal for you. Install this small program directly onto your compatible smartphone you want to monitor to begin recording. Software is also available for Symbian OS, iOS (IPhone), Android(Google), Windows 7 Phone & Blackberry mobiles. (Copy of the Vendor Homepage: http://www.mobile-spy.com -- http://www.mobile-spy.com/smartdemo.html) Abstract Advisory Information: ============================== The Vulnerability Laboratory Research Team discovered multiple Web Vulnerabilities in the MobileSpy & bound phone applications. Vulnerability Disclosure Timeline: ================================== 2012-05-16: Public or Non-Public Disclosure Discovery Status: ================= Published Exploitation Technique: ======================= Remote Severity Level: =============== High Technical Details & Description: ================================ 1.1 Multiple server-side input validation vulnerabilities(persistent) are detected in the MobileSpy Surveillance web application. A remote attacker can manipulate specific application (paramater) requests or can hijack customer/spy sessions with low user inter action. Vulnerable Modules: [+] SMS Messages Sent and Received - Listing [-] SMS Logs - View SMS - Text Message Display and Sender Pictures: ../1.png Note: If you know for example your mobile is observed you can inject script code to your sms and send it via service. The SMS spy service is logging the issue & the script code is getting executed on the display website of the observer. This possibility allows the observed person to spy back the attacking observer by redirection to log him when processing to watch the sms. 1.2 Multiple client side input validation vulnerabilities (non-persistent) are detected in the MobileSpy Surveillance web application. The bugs allows remote attackers to implement/inject malicious script code on the application-side (persistent). Successful exploitation of the vulnerability can lead to session hijacking (manager/admin) or stable (persistent) context manipulation. Exploitation requires medium or high user inter action. Vulnerable Module(s): [+] Login [+] Search Module Pictures: ../2.png 1.3 A remote SQL Injection vulnerability is detected in the MobileSpy Surveillance web application. The vulnerability allows an attacker (remote) or local low privileged user account to inject/execute own sql commands on the affected application dbms. The vulnerability is located in the pgno= & order by application value request. Successful exploitation of the vulnerability results in dbms & application compromise. Vulnerable Module(s): [+] Parameter (pgno=|0&order=) --- SQL Error Logs --- SELECT * FROM callinfotbl WHERE RecType=0 AND UserID=3 ORDER BY CallDate DESC, CallTime DESC LIMIT -10, 10 ... or Showing -49 - 0 of 0 recordsSELECT *, DATE_FORMAT(SmsTime, %H:%i:%s %p ) as sTime FROM sms WHERE UserID=1 ORDER BY SmsDate DESC, SmsTime DESC LIMIT -50, 50 has error! Picture(s): ../3.png ../4.png ../5.png Proof of Concept (PoC): ======================= The vulnerabilities can be exploited by remote attackers. For demonstration or reproduce ... 1.1 Code Review: Login (login.php) - (Persistent)

Invalid Username

" tabindex="1" >
1.2 Code Review: Messages Sent and Received (index.php) - (Non-Persistent)

 Download CSV | Show All | "> Outgoing | "<[INSERT OWN NON-PERSISTENT SCRIPTCODE HERE!!!]>Incoming

 Download CSV | Show All | Outgoing | "<[INSERT OWN NON-PERSISTENT SCRIPTCODE HERE!!!]>Incoming

References: https://www.mobilespylogs.com/member/index.php?page=smsinout&pgno=0&show=0&order=[INSERT OWN NON-PERSISTENT SCRIPTCODE HERE!!!] https://www.mobilespylogs.com/member/index.php?page=smsinout&pgno=0&show=[INSERT OWN NON-PERSISTENT SCRIPTCODE HERE!!!] Code Review: Search Module (index.php) - (Non-Persistent)


Search Logs for a Specific Phone Number


Search Result for ">"