Document Title:
===============
MobileSpy Android|iPhone|W7P|sOS - Web Vulnerabilities
References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=140
Release Date:
=============
2012-05-15
Vulnerability Laboratory ID (VL-ID):
====================================
140
Common Vulnerability Scoring System:
====================================
7.1
Product & Service Introduction:
===============================
Mobile Spy defines the latest in high-tech cell phone surveillance. This revolutionary software allows individuals to easily install
monitoring software directly onto a compatible smartphone that you own or have the proper consent to monitor. Once the software is
installed onto the phone to be monitored, it silently logs activity such as SMS messages and call information along with recording
GPS locations every 30 minutes when a GPS signal is available. There no need to worry about being near the phone to view the activity
after installation because activities are uploaded to a private account viewable using ANY web browser, even a Mac or phone web browser.
Here s a diagram to help you visualize how this process works. This hybrid software gives you the ability to monitor your BlackBerry, iPhone,
iPad, Android, Windows Mobile or Symbian OS based smartphone. Mobile Spy is the next generation of smartphone spy software. Do you suspect that
your child or employee is abusing their SMS or vehicle privileges? If yes, then this software is ideal for you. Install this small program
directly onto your compatible smartphone you want to monitor to begin recording.
Software is also available for Symbian OS, iOS (IPhone), Android(Google), Windows 7 Phone & Blackberry mobiles.
(Copy of the Vendor Homepage: http://www.mobile-spy.com -- http://www.mobile-spy.com/smartdemo.html)
Abstract Advisory Information:
==============================
The Vulnerability Laboratory Research Team discovered multiple Web Vulnerabilities in the MobileSpy & bound phone applications.
Vulnerability Disclosure Timeline:
==================================
2012-05-16: Public or Non-Public Disclosure
Discovery Status:
=================
Published
Exploitation Technique:
=======================
Remote
Severity Level:
===============
High
Technical Details & Description:
================================
1.1
Multiple server-side input validation vulnerabilities(persistent) are detected in the MobileSpy Surveillance web application.
A remote attacker can manipulate specific application (paramater) requests or can hijack customer/spy sessions with low user inter action.
Vulnerable Modules:
[+] SMS Messages Sent and Received - Listing
[-] SMS Logs - View SMS - Text Message Display and Sender
Pictures:
../1.png
Note: If you know for example your mobile is observed you can inject script code to your sms and send it via service.
The SMS spy service is logging the issue & the script code is getting executed on the display website of the observer.
This possibility allows the observed person to spy back the attacking observer by redirection to log him when processing to watch the sms.
1.2
Multiple client side input validation vulnerabilities (non-persistent) are detected in the MobileSpy Surveillance web application.
The bugs allows remote attackers to implement/inject malicious script code on the application-side (persistent).
Successful exploitation of the vulnerability can lead to session hijacking (manager/admin) or stable (persistent) context
manipulation. Exploitation requires medium or high user inter action.
Vulnerable Module(s):
[+] Login
[+] Search Module
Pictures:
../2.png
1.3
A remote SQL Injection vulnerability is detected in the MobileSpy Surveillance web application.
The vulnerability allows an attacker (remote) or local low privileged user account to inject/execute own sql commands
on the affected application dbms. The vulnerability is located in the pgno= & order by application value request.
Successful exploitation of the vulnerability results in dbms & application compromise.
Vulnerable Module(s):
[+] Parameter (pgno=|0&order=)
--- SQL Error Logs ---
SELECT * FROM callinfotbl WHERE RecType=0 AND UserID=3 ORDER BY CallDate DESC, CallTime DESC LIMIT -10, 10
... or
Showing -49 - 0 of 0 recordsSELECT *, DATE_FORMAT(SmsTime, %H:%i:%s %p ) as sTime FROM sms WHERE UserID=1
ORDER BY SmsDate DESC, SmsTime DESC LIMIT -50, 50 has error!
Picture(s):
../3.png
../4.png
../5.png
Proof of Concept (PoC):
=======================
The vulnerabilities can be exploited by remote attackers.
For demonstration or reproduce ...
1.1
Code Review: Login (login.php) - (Persistent)
Invalid Username
" tabindex="1" > | ||
![]() |
1.2
Code Review: Messages Sent and Received (index.php) - (Non-Persistent)
|
|
Download CSV
| Show All | Outgoing
| "<[INSERT OWN NON-PERSISTENT SCRIPTCODE HERE!!!]>Incoming
Search Logs for a Specific Phone Number
Search Result for ">"