Document Title: =============== USB Disk Free v1.0 iOS - File Include Vulnerability Date: ===== 2014-10-10 References: =========== http://www.vulnerability-lab.com/get_content.php?id= VL-ID: ===== 1340 Common Vulnerability Scoring System: ==================================== 6.1 Introduction: ============= USB Disk is your File Manager which support Music Player, Video Player, Photo Viewer, PDF Reader, Document Viewer and Zip & RAR Extractor . Support the following file types: - Music & Songs: MP3, M4A, W4P, WP4, AAC, WAV, CAF - Video & Movie: MP4, M4V, MOV, MPV, 3GP - Photo & Images: BMP, PNG, JPG, JPEG, GIF, TIF, TIFF, ICO - Document: PDF, TXT, PAGES, NUMBERS, KEY, DOC, DOCX, XLS, XLSX, PPT, PPTX, RTF - Archive: ZIP, RAR, 7Z (Copy of the Vendor Homepage: https://itunes.apple.com/au/app/usb-disk-free-file-manager/id908003044 ) Abstract: ========= The Vulnerability Laboratory Research Team discovered a file include vulnerability in the official USB Disk Free - File Manager & File Transfer v1.0 iOS mobile application. Report-Timeline: ================ 2014-10-10: Public Disclosure (Vulnerability Laboratory) Status: ======== Published Affected Products: ================== Yajing Qian Product: USB Disk Free (File Manager & Wifi File Transfer) - iOS Web Application v1.0 Exploitation-Technique: ======================= Local Severity: ========= High Details: ======== A local file include web vulnerability has been discovered in the official USB Disk Free - File Manager & Transfer v1.0 iOS mobile application. The local file include web vulnerability allows remote attackers to unauthorized include local file/path requests or system specific path commands to compromise the mobile web-application. The web vulnerability is located in the `filename` value of the `newfile upload` module. Remote attackers are able to inject own files with malicious `filename` values in the `newfile` POST method request to compromise the mobile web-application. The local file/path include execution occcurs in the index dir listing of the wifi interface context. The attacker is able to inject the local file include request by usage of the `wifi interface` in connection with the vulnerable newfile upload request. Remote attackers are also able to exploit the filename issue in combination with persistent injected script codes to execute different local malicious attack requests. The attack vector is located on the application-side of the wifi service and the request method to inject is POST. The security risk of the local file include web vulnerability is estimated as high with a cvss (common vulnerability scoring system) count of 6.1. Exploitation of the local file include web vulnerability requires no user interaction or privileged web-application user account. Successful exploitation of the local file include web vulnerability results in mobile application compromise or connected device component compromise. Request Method(s): [+] [POST] Vulnerable Module(s): [+] newfile Vulnerable Parameter(s): [+] filename Affected Module(s): [+] Index Path Dir Listing (http://localhost:8080/) Proof of Concept: ================= The local file include web vulnerability can be exploited by remote attackers without privileged application user account and also without user interaction. For security demonstration or to reproduce the security vulnerability follow the provided information and steps below to continue. PoC: Link POST http://localhost:8080/./[LOCAL FILE INCLUDE VULNERABILITY].* PoC: Exploit