Document Title: =============== MyFolder FileManager 1.8 iOS - Multiple Vulnerabilities Date: ===== 2013-07-09 References: =========== http://www.vulnerability-lab.com/get_content.php?id=1001 VL-ID: ===== 1001 Common Vulnerability Scoring System: ==================================== 7.3 Introduction: ============= My folder provides wireless U disk, the folder sorting features, document management, file preview features. Default folder rules, the different types of files transfered to the corresponding folder File Transfer features: Upload your files to your iOS device via Wi-Fi or iTunes; Browse or download through your PC`s web browser from iOS devices. File Preview feature: pictures, office documents (doc, xls, ppt, ...), pdf, txt, as well as audio and video file preview features. Custom folder rules, in accordance with the rules organize your files into the corresponding folder & a Password lock function (Homepage of the Vendor: https://itunes.apple.com/en/app/myfolder-wifi+disk+file-manager/id583185266 ) Abstract: ========= The Vulnerability Laboratory Research Team discovered multiple vulnerabilities in the MyFolder Wifi v1.8 application (Apple iOS - iPad & iPhone). Report-Timeline: ================ 2013-07-10: Public Disclosure (Vulnerability Laboratory) Status: ======== Published Affected Products: ================== Apple AppStore Product: MyFolder - iOS Application v1.8 Exploitation-Technique: ======================= Remote Severity: ========= Critical Details: ======== 1.1 A local command injection web vulnerability is detected in the MyFolder Wifi v1.8 application (Apple iOS - iPad & iPhone). The vulnerability allows to inject local commands via vulnerable system values to compromise the apple mobile application. The vulnerbility is located in the index module when processing to load the ipad or iphone device name. Local attackers can change the ipad or iphone device name to system specific commands and file/path requests to provoke the execution when the victim is processing to watch the index site of the application. Exploitation of the web vulnerability requires a local privilege device user account (standard) without user interaction. Successful exploitation of the vulnerability results unauthorized execution of system specific commands or file/path requests. Vulnerable Application(s): [+] MyFolder Wifi v1.8 - ITunes or AppStore (Apple) Vulnerable Module(s): [+] Index Vulnerable Parameter(s): [+] device name (iPad or iPhone) Affected Module(s): [+] Header Device Name - Listing 1.2 A persistent input validation web vulnerability is detected in the MyFolder Wifi v1.8 application (Apple iOS - iPad & iPhone). The bug allows an attacker (remote) to implement/inject malicious script code on the application-side (persistent) of the app web service. The vulnerability is located in the index file dir listing module of the web-server (http://localhost:8080/filename) when processing to display via POST request method injected manipulated `file or folder names`. The persistent script code will be executed in the main index file dir listing module when the service is lists the new malicious injected filename as item. Exploitation of the persistent web vulnerability requires low or medium user interaction without application user account. Successful exploitation of the vulnerability can lead to persistent session hijacking (customers), account steal via persistent web attacks, persistent phishing or stable (persistent) certificate mail notification context manipulation. Vulnerable Application(s): [+] MyFolder Wifi v1.8 - ITunes or AppStore (Apple) Vulnerable Module(s): [+] Add File Vulnerable Parameter(s): [+] filename Affected Module(s): [+] Index Listing Proof of Concept: ================= 1.1 The local command injection vulnerability can be exploited by remote attacker with device access and without user interaction. For demonstration or reproduce ... >
..
Archives/ ( 0.1 Kb, Modified:07/09/2013 01:34)
Audio/ ( 0.1 Kb, Modified:07/09/2013 01:34)
Documents/ ( 0.1 Kb, Modified:07/09/2013 01:34)
Other/ ( 0.1 Kb, Modified:07/09/2013 01:34)
[OUTPUT: PERSISTENT INJECTED SCRIPT CODE!]/(0.2 Kb, Modified:07/09/2013 01:42)
Video/ ( 0.1 Kb, Modified:07/09/2013 01:34)
sample.docx ( 104.5 Kb, Modified:04/24/2013 22:59)
sample.pdf ( 48.9 Kb, Modified:04/24/2013 22:59)
sample.pptx ( 473.4 Kb, Modified:04/24/2013 22:59)
--- Request Session Logs ---
Status: 200[OK]
POST http://localhost:8080/
Load Flags[LOAD_DOCUMENT_URI LOAD_INITIAL_DOCUMENT_URI ] Content Size[1739] Mime Type[application/x-unknown-content-type]
Request Headers:
Host[localhost:8080]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:22.0) Gecko/20100101 Firefox/22.0]
Accept[text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Referer[http://localhost:8080/]
Connection[keep-alive]
Post Data:
POST_DATA[-----------------------------23942944224345
Content-Disposition: form-data; name="file"; filename="[PERSISTENT INJECTED SCRIPT CODE!]"
Content-Type: image/png
Solution:
=========
1.1
The command/path injection web vulnerability can be patched by a parse and secure encoding of the device name in the header location.
1.2
The persistent script code injection vulnerability with persistent vector can be patched by a secure parse and restriction of the filename value.
Risk:
=====
1.1
The security risk of the local command or path inject web vulnerability is estimated as high(+).
1.2
The security risk of the persistent input validation web vulnerability is estimated as high(-).
Credits:
========
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri (bkm@evolution-sec.com)
Disclaimer:
===========
The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties,
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business
profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some
states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation
may not apply. We do not approve or encourage anybody to break any vendor licenses, policies, deface websites, hack into databases
or trade with fraud/stolen material.
Domains: www.vulnerability-lab.com - www.vuln-lab.com - www.vulnerability-lab.com/register
Contact: admin@vulnerability-lab.com - support@vulnerability-lab.com - research@vulnerability-lab.com
Section: video.vulnerability-lab.com - forum.vulnerability-lab.com - news.vulnerability-lab.com
Social: twitter.com/#!/vuln_lab - facebook.com/VulnerabilityLab - youtube.com/user/vulnerability0lab
Feeds: vulnerability-lab.com/rss/rss.php - vulnerability-lab.com/rss/rss_upcoming.php - vulnerability-lab.com/rss/rss_news.php
Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory.
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other
media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and
other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed),
modify, use or edit our material contact (admin@vulnerability-lab.com or support@vulnerability-lab.com) to get a permission.
Copyright © 2013 | Vulnerability Laboratory