diff --git a/files.csv b/files.csv index 4df92cca8..50356dec6 100755 --- a/files.csv +++ b/files.csv @@ -31338,3 +31338,13 @@ id,file,description,date,author,platform,type,port 34806,platforms/php/webapps/34806.txt,"JNM Guestbook 3.0 'index.php' Cross Site Scripting Vulnerability",2009-07-09,Moudi,php,webapps,0 34807,platforms/php/webapps/34807.txt,"JNM Solutions DB Top Sites 1.0 'vote.php' Cross Site Scripting Vulnerability",2009-07-08,Moudi,php,webapps,0 34808,platforms/php/webapps/34808.txt,"Rapidsendit Clone Script 'admin.php' Insecure Cookie Authentication Bypass Vulnerability",2009-07-08,NoGe,php,webapps,0 +34809,platforms/php/webapps/34809.txt,"Tausch Ticket Script 3 suchauftraege_user.php userid Parameter SQL Injection",2009-07-07,Moudi,php,webapps,0 +34810,platforms/php/webapps/34810.txt,"Tausch Ticket Script 3 vote.php descr Parameter SQL Injection",2009-07-07,Moudi,php,webapps,0 +34811,platforms/php/webapps/34811.txt,"Linea21 1.2.1 'search' Parameter Cross Site Scripting Vulnerability",2009-07-08,"599eme Man",php,webapps,0 +34812,platforms/php/webapps/34812.html,"Docebo 3.6 'description' Parameter Cross Site Scripting Vulnerability",2010-10-04,"High-Tech Bridge SA",php,webapps,0 +34813,platforms/php/webapps/34813.txt,"Elxis 2009.2 rev2631 SQL Injection",2010-10-05,"High-Tech Bridge SA",php,webapps,0 +34814,platforms/php/webapps/34814.txt,"SquirrelMail Virtual Keyboard Plugin 'vkeyboard.php' Cross Site Scripting Vulnerability",2010-10-05,"Moritz Naumann",php,webapps,0 +34815,platforms/windows/remote/34815.html,"Internet Explorer 8 - Fixed Col Span ID Full ASLR, DEP & EMET 5.0 Bypass (MS12-037)",2014-09-29,"ryujin & sickness",windows,remote,0 +34816,platforms/ios/webapps/34816.txt,"GS Foto Uebertraeger 3.0 iOS - File Include Vulnerability",2014-09-29,Vulnerability-Lab,ios,webapps,0 +34817,platforms/windows/webapps/34817.rb,"Microsoft Exchange IIS HTTP Internal IP Address Disclosure",2014-09-29,"Nate Power",windows,webapps,0 +34818,platforms/php/webapps/34818.html,"OpenFiler 2.99.1 - CSRF Vulnerability",2014-09-29,"Dolev Farhi",php,webapps,446 diff --git a/platforms/ios/webapps/34816.txt b/platforms/ios/webapps/34816.txt new file mode 100755 index 000000000..20f2674f7 --- /dev/null +++ b/platforms/ios/webapps/34816.txt @@ -0,0 +1,239 @@ +Document Title: +=============== +GS Foto Uebertraeger v3.0 iOS - File Include Vulnerability + + +References (Source): +==================== +http://www.vulnerability-lab.com/get_content.php?id=1325 + + +Release Date: +============= +2014-09-22 + + +Vulnerability Laboratory ID (VL-ID): +==================================== +1325 + + +Common Vulnerability Scoring System: +==================================== +6.3 + + +Product & Service Introduction: +=============================== +The best Photo Transfer app on the App Store!Photo Transfer allows you to quickly transfer photos between your iPhone, +iPad, PC or Mac using your local Wi-Fi network, without any 3rd party transfer utilities. It can easily access your photo +libraries via wifi from any computer with a web browser(IE/Chrome/Safari) on the same wifi network, very easy to use! + +(Copy of the Homepage: https://itunes.apple.com/en/app/wifi-fotos-ubertrager-+-uber/id902267412 ) + + + +Abstract Advisory Information: +============================== +The Vulnerability Laboratory Research Team discovered a file include vulnerability in the official Golden Soft Photo/Foto Uebertraeger v3.0 iOS mobile application. + + +Vulnerability Disclosure Timeline: +================================== +2014-09-22: Public Disclosure (Vulnerability Laboratory) + + +Discovery Status: +================= +Published + + +Affected Product(s): +==================== +Golden Soft +Product: Foto ?bertr?ger - iOS Mobile Web Application 3.0 + + +Exploitation Technique: +======================= +Local + + +Severity Level: +=============== +High + + +Technical Details & Description: +================================ +A local file include web vulnerability has been discovered in the official Briefcase Pro v4.0 iOS mobile wifi web-application. +The local file include web vulnerability allows remote attackers to unauthorized include local file/path requests or system +specific path commands to compromise the mobile web-application. + +The web vulnerability is located in the `filename and albumname` values of the `uploadPhotoPost` module. Remote attackers are able to inject +own files with malicious `filename or albumname` values in the `uploadPhotoPost` POST method request to compromise the mobile web-application. +The local file/path include execution occcurs in the index dir listing of the wifi interface context. The attacker is able to inject the local +file include request by usage of the `wifi interface` in connection with the vulnerable upload request. + +Remote attackers are also able to exploit the filename/albumname validation issue in combination with persistent injected script codes to execute +different local malicious attacks requests. The attack vector is on the application-side of the wifi service and the request method to inject is POST. + +The security risk of the local file include web vulnerability is estimated as high with a cvss (common vulnerability scoring system) count of 6.3. +Exploitation of the local file include web vulnerability requires no user interaction or privileged web-application user account. Successful exploitation +of the local file include web vulnerability results in mobile application or connected device component compromise. + + +Request Method(s): + [+] [POST] + +Vulnerable Module(s): + [+] uploadPhotoPost + +Vulnerable Parameter(s): + [+] filename & albumname + +Affected Module(s): + [+] Index Path Dir Listing (http://localhost/) + + +Proof of Concept (PoC): +======================= +The local file include web vulnerability can be exploited by local wifi attackers in the network without privileged application user account or user interaction. +For security demonstration or to reproduce the security vulnerability follow the provided information or steps below to continue. + + +PoC: Url +http://localhost/./[LOCAL FILE INCLUDE VULNERABILITY VIA FILENAME VALUE!] + + +PoC: Exploit Photo Transfer.htm + +