Document Title: =============== Airdroid iOS, Android & Win 3.1.3 - Persistent Vulnerability Date: ===== 2015-07-20 References: =========== http://www.vulnerability-lab.com/get_content.php?id=1543 VL-ID: ===== 1543 Common Vulnerability Scoring System: ==================================== 3.9 Introduction: ============= AirDroid allows you to access wirelessly and for free on your Android phone or tablet from Windows, Mac or the Internet, and to control it. (Copy of the Product Homepage: https://www.airdroid.com/de/ ) Abstract: ========= The Vulnerability Laboratory Core Research Team discovered an application-side input validation web vulnerability in the official SandStudio AirDroid (windows, ios and android) mobile web-application. Report-Timeline: ================ 2015-07-05: Researcher Notification & Coordination (Hadji Samir) 2015-07-06: Vendor Notification (Security Team) 2015-07-20: Public Disclosure (Vulnerability Laboratory) Status: ======== Published Affected Products: ================== Sand Studio Product: AirDroid iOS Application (Andoird, Windows, MacOS & Web) v3.1.3 Exploitation-Technique: ======================= Remote Severity: ========= Medium Details: ======== A persistent input validation web vulnerability has been discovered in the official SandStudio AirDroid (windows, ios and android) mobile web-application. The vulnerability allows remote attacker or low privilege user accounts to inject malicious codes on the application-side of the affected mobile web-application. The vulnerability is located in the send messages and the send message with an attached file module. Remote attackers with low privilege user account are able to upload file name with malicious strings like ``>