Document Title: =============== Photo Transfer v4.1 iOS - Multiple Web Vulnerabilities References (Source): ==================== http://www.vulnerability-lab.com/get_content.php?id=933 Release Date: ============= 2013-04-23 Vulnerability Laboratory ID (VL-ID): ==================================== 933 Common Vulnerability Scoring System: ==================================== 6 Product & Service Introduction: =============================== Photo Transfer is the easiest way to transfer photos and videos to and from your iPhone, iPad, iPad mini and iTouch. This App not only lets you download photos or videos to your computer easily from your iPhone or iPad but also but also exchange photos from your other device to your iPad, iPhone or iPod touch. No USB or extra software is needed. - Easy - Easily download multiple photos from your iPad, iPhone or iPod touch to your computer (Windows and Mac) - Useful - Exchange photos and videos between multiple iPhone, iPad or iTouch devices - Convenient - Select up to multiple photos or videos to transfer at one time and transfer them from Device to Computer or Device to Device - Original - Transfer photos & videos in full resolution, photos are not reduced in quality as with other apps - Shortcut - Transfer photos between devices over Wifi - Modern - No USB or extra software required - Widely - Works with computers running Windows, Mac and Linux - Safe - Your photos and videos are transferred directly from device to device using your local wifi network. They are not stored in an external server and they never leave your local wifi network - Economical - Pay only ONCE to install this app on your iPhone and iPad (as long as the same iTunes account is used on both devices) * Upload photos and videos from your computer to your iPad, iPhone or iPod touch - Photos are saved to the Saved photos album * To transfer photos from one iPhone/iPad to another both devices needn`t to have this app installed. You can only use device s browser download or upload media. * Access to a properly configured wifi network is required for this application to work. Some public or private wifi networks may be configured to block communication between devices preventing the transfer connection to be established (Copy of the Homepage: https://itunes.apple.com/de/app/photo-transfer-lite-wifi/id606113043 ) Abstract Advisory Information: ============================== The Vulnerability Laboratory Research Team discovered multiple vulnerabilities in the mobile Wifi Photo Transfer 2.1 & 1.1 Pro app for the apple ipad & iphone. Vulnerability Disclosure Timeline: ================================== 2013-04-24: Public Disclosure Discovery Status: ================= Published Affected Product(s): ==================== Apple AppStore Product: Photo Transfer iOS 4.1 Exploitation Technique: ======================= Remote Severity Level: =============== Medium Technical Details & Description: ================================ 1.1 A local command injection web vulnerability is detected in the mobile Photo Transfer v4.1 app for the apple ipad & iphone. The vulnerability allows to inject local commands via vulnerable system values to compromise the apple mobile iOS application. The vulnerability is located in the index module when processing to load the ipad or iphone device album folder names. Local attackers can change the ipad or iphone device photo album names to system specific commands and file requests to provoke the execution when processing to watch the main index album listing. The execution of the script code occurs in the album name web context when processing to display the vulnerable name value. Exploitation of the web vulnerability does not require a privileged application user account (standard) or user interaction. Successful exploitation of the vulnerability results unauthorized execution of system specific commands and path requests. Vulnerable Application(s): [+] Photo Transfer v4.1 - ITunes or AppStore (Apple) Vulnerable Parameter(s): [+] path/folder name Affected Module(s): [+] Index Listing - Album 1.2 An arbitrary file download vulnerability is detected in the mobile Photo Transfer v4.1 app for the apple ipad & iphone. The vulnerability allows remote attackers to download via manipulated POST method unauthorized remote files on the affected web-server file system. The vulnerability is located in the `ibatchdownload` module. Remote attackers can unauthorized download files via POST request method when processing to load manipulated `selected_files` values. Remote attackers are able to change the selected file names of the POSt request to own file names to unauthorized capture pictures by downloading. Exploitation of the local arbitrary file download vulnerability does not require user interaction and also no privileged user account. Successful exploitation of the app vulnerability results in information disclosure and unauthorized web-server photo file access/downloads. Vulnerable Application(s): [+] Photo Transfer v4.1 - ITunes or AppStore (Apple) Vulnerable Module(s): [+] ibatchdownload Vulnerable Parameter(s): [+] selected_files Proof of Concept (PoC): ======================= 1.1 The local command injection web vulnerability can be exploited by remote attackers without privileged application user account and without user interaction. For demonstration or reproduce ... Manually steps to reproduce ... Command Inject via Album Foldername 1. Install the application from itunes or directly from the appstore 2. Open the service and make the webserver available via http 3. Now open for example your iphone or ipad device to sync 4. Open on your device (iphone or ipad) the standard albums in photos 5. Change the name of one of your standard album to a path command inject string 6. Open another device and access the index listing of the application after the album sync 7. The code will be executed from the main album `name` listing context 8. Successful reproduced ...! PoC: Wifi Album Easy Photo Transfer Tools >%20>"