Document Title:
===============
Bluetooth U v1.2.0 iOS - Directory Traversal Vulnerability
Date:
=====
2013-10-15
References:
===========
http://www.vulnerability-lab.com/get_content.php?id=1111
VL-ID:
=====
1111
Common Vulnerability Scoring System:
====================================
6.5
Introduction:
=============
Bluetooth U ensure both devices(iPhone&iPod&iPad) transfer files mutually, No file type restrictions.
(Copy of the Homepage: https://itunes.apple.com/de/app/bluetooth-u-share-files-photo/id526268815 )
Abstract:
=========
The Vulnerability Laboratory Research Team discovered multiple web vulnerabilities in the Bluetooth U v1.2.0 mobile iOS web-application.
Report-Timeline:
================
2013-10-16: Public Disclosure (Vulnerability Laboratory)
Status:
========
Published
Affected Products:
==================
Apple AppStore
Product: Bluetooth U - Mobile Web Application v1.2.0
Exploitation-Technique:
=======================
Remote
Severity:
=========
High
Details:
========
A local path traversal and file include vulnerability is detected in the Bluetooth U v1.2.0 iOS mobile application (Apple iOS - iPad & iPhone).
The path traversal allows remote attackers to unauthorized switch or access folder to access application, device or system information.
The web vulnerability allows to bypass the regular path to folder generate by exploitation of the `New Folder` add function. Remote attackers
can create a directory by using a manipulated second path with a frame to load. The vulnerability can be exploited by requesting the mobile
application with a manipulated path (folder) value parameter. The redirect will load the wrong path value and redirects the user to the local
mobile application or device system path/file. The malicious context also executes in the DelegateData on deletes too.
Exploitation of the path/directory web vulnerability requires no user interaction and non privileged mobile web.application user account.
Successful exploitation of the vulnerability results in the unauthorized access of remote users to local application path or system/device files.
Vulnerable Module(s):
[+] New Folder - Index
Vulnerable Parameter(s):
[+] chxItem & ChkItem
Proof of Concept:
=================
The path/directory-traversl web vulnerability can be exploited by remote attackers without privileged application user account and also
without user interaction. For demonstration or reproduce ...
PoC: Foldername - Index File Dir Listing (Wifi)