diff --git a/files.csv b/files.csv index 15c43c928..4c3e1489e 100755 --- a/files.csv +++ b/files.csv @@ -29760,8 +29760,15 @@ id,file,description,date,author,platform,type,port 33014,platforms/php/webapps/33014.txt,"Achievo <= 1.3.4 Multiple Cross Site Scripting Vulnerabilities",2009-05-28,MaXe,php,webapps,0 33015,platforms/linux/dos/33015.c,"Linux Kernel 2.6.x 'splice(2)' Double Lock Local Denial of Service Vulnerability",2009-05-29,"Miklos Szeredi",linux,dos,0 33016,platforms/hardware/remote/33016.txt,"SonicWALL SSL-VPN 'cgi-bin/welcome/VirtualOffice' Remote Format String Vulnerability",2009-05-29,"Patrick Webster",hardware,remote,0 +33017,platforms/linux/dos/33017.txt,"Adobe Acrobat <= 9.1.3 - Stack Exhaustion Denial of Service Vulnerability",2009-05-29,"Saint Patrick",linux,dos,0 +33018,platforms/windows/dos/33018.txt,"cFos Personal Net 3.09 - Remote Heap Memory Corruption Denial of Service",2014-04-25,LiquidWorm,windows,dos,0 33020,platforms/linux/dos/33020.py,"CUPS <= 1.3.9 'cups/ipp.c' NULL Pointer Dereference Denial Of Service Vulnerability",2009-06-02,"Anibal Sacco",linux,dos,0 33021,platforms/php/webapps/33021.txt,"PHP-Nuke 8.0 Downloads Module 'query' Parameter Cross Site Scripting Vulnerability",2009-06-02,"Schap Security",php,webapps,0 33022,platforms/php/webapps/33022.txt,"Joomla! Prior to 1.5.11 Multiple Cross Site Scripting and HTML Injection Vulnerabilities",2009-06-03,"Airton Torres",php,webapps,0 33023,platforms/multiple/remote/33023.txt,"Apache Tomcat <= 6.0.18 Form Authentication Existing/Non-Existing Username Enumeration Weakness",2009-06-03,"D. Matscheko",multiple,remote,0 +33024,platforms/windows/remote/33024.txt,"Microsoft Internet Explorer 5.0.1 - Cached Content Cross Domain Information Disclosure Vulnerability",2009-06-09,"Jorge Luis Alvarez Medina",windows,remote,0 33025,platforms/windows/remote/33025.txt,"LogMeIn 4.0.784 'cfgadvanced.html' HTTP Header Injection Vulnerability",2009-06-05,Inferno,windows,remote,0 +33026,platforms/ios/webapps/33026.txt,"Depot WiFi 1.0.0 iOS - Multiple Vulnerabilities",2014-04-25,Vulnerability-Lab,ios,webapps,0 +33027,platforms/windows/remote/33027.py,"Kolibri 2.0 GET Request - Stack Buffer Overflow",2014-04-25,Polunchis,windows,remote,80 +33028,platforms/linux/local/33028.txt,"JRuby Sandbox 0.2.2 - Sandbox Escape",2014-04-25,joernchen,linux,local,0 +33030,platforms/php/webapps/33030.txt,"ApPHP MicroBlog 1.0.1 - Multiple Vulnerability (LFI/RCE)",2014-04-26,"jiko jawad",php,webapps,0 diff --git a/platforms/ios/webapps/33026.txt b/platforms/ios/webapps/33026.txt new file mode 100755 index 000000000..a95e94046 --- /dev/null +++ b/platforms/ios/webapps/33026.txt @@ -0,0 +1,319 @@ +Document Title: +=============== +Depot WiFi v1.0.0 iOS - Multiple Web Vulnerabilities + + +References (Source): +==================== +http://www.vulnerability-lab.com/get_content.php?id=1259 + + +Release Date: +============= +2014-04-23 + + +Vulnerability Laboratory ID (VL-ID): +==================================== +1259 + + +Common Vulnerability Scoring System: +==================================== +8.6 + + +Product & Service Introduction: +=============================== +With Depot you can archive all kinds of files on your iPhone, iPod or iPad and then share them on a local WiFi network +In Depot not only you can receive files from other applications that supports document interaction (as Mail or Safari), +but you can also download and upload files from any kind of PC and internet enabled devices. You can then open your files +directly on your device or share them between other devices such as smartphones, tablets, PCs, game consoles and smart TVs +connected through a local WiFi. + +(Copy of the Homepage: https://itunes.apple.com/br/app/depot/id858248612 ) + + +Abstract Advisory Information: +============================== +The Vulnerability Laboratory Research Team discovered multiple vulnerabilities in the official Depot v1.0.0 iOS mobile web-application. + + +Vulnerability Disclosure Timeline: +================================== +2014-04-23: Public Disclosure (Vulnerability Laboratory) + + +Discovery Status: +================= +Published + + +Affected Product(s): +==================== +Maurizio Berioli +Product: Depot - iOS Mobile Application 1.0 + + +Exploitation Technique: +======================= +Remote + + +Severity Level: +=============== +High + + +Technical Details & Description: +================================ +1.1 +A local file include web vulnerability has been discovered in the official Depot v1.0.0 iOS mobile web-application. The local file include +web vulnerability allows remote attackers to unauthorized include local file/path requests or system specific path commands to compromise +the mobile web-application. + +The web vulnerability is located in the `filename` value of the `+Files > Upload!` module. Remote attackers are able to inject own files with +malicious `filename` values in the `Upload!` POST method request to compromise the mobile web-application. The local file/path include execution +occurs in the `Depot index item list` context of the wifi interface. Attackers are able to inject own local file requests by usage of the `wifi interface` +path value or by a local privileged device user account via `filename sync` rename. + +Remote attackers are also able to exploit the filename validation issue in combination with persistent script codes to execute different local malicious +attacks or requests. The attack vector is on the application-side of the wifi service and the request method to inject is POST. The security risk of the +local file include web vulnerability is estimated as high with a cvss (common vulnerability scoring system) count of 6.9. + +Exploitation of the local file include web vulnerability requires no privileged application user account or user interaction. Successful exploitation of +the local file include web vulnerability results in mobile application or connected device component compromise. + + +Request Method(s): + [+] [POST] + +Vulnerable Module(s): + [+] +File > Upload! + +Vulnerable Function(s): + [+] Create a new Folder (remote) + [+] rename (local sync) + +Vulnerable Parameter(s): + [+] filename (path value) + +Affected Module(s): + [+] Depot Index Item Listing (http://localhost/) + + + + +1.2 +A code execution web vulnerability has been discovered in the official Depot v1.0.0 iOS mobile web-application. The issue allows an attacker to +compromise the application and connected device components by exploitation of system specific code execution vulnerability in the webdisk interface. + +The vulnerability is located in the GET method request of the `+Folders` module. The main index provides a folders add form which is not secure +encoding the regular inputs. The context can be implemented to the folders form and the results is the application-side execution of system +specific malicious codes in the index. The file itself will not be transfered and the input generates the listing context to the index. + +The input field of the +Folders module executes the wrong encoded input via GET method request by the name value. Remote attackers are able to +execute the own malicious codes by usage of a script code payload in combination with the affected system device values. The execution of the code +occurs in the main depot file dir listing context. The attack vector is on application-side and the request method to attack the service is GET. +The security risk of the remote code execution web vulnerability is estimated as critical with a cvss (common vulnerability scoring system) count of 8.9. + +Exploitation of the remote code execution web vulnerability requires no privileged application user account (passwd default blank) or user interaction. +Successful exploitation of the code execution vulnerability results in mobile application compromise and connected or affected device component compromise. + + +Request Method(s): + [+] POST + +Vulnerable Module(s): + [+] +Folders + +Vulnerable Function(s): + [+] Create a new Folder (remote) + [+] rename (local sync) + +Vulnerable Parameter(s): + [+] foldername + +Affected Module(s): + [+] Depot Index Item Listing (http://localhost/) + + +Proof of Concept (PoC): +======================= +1.1 +The local file include web vulnerability can be exploited by local attackers without privileged application user account or user interaction. +For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue. + +PoC: Exploit Filename Index + +
+Folders [+] | ||||
No sub-folders presents. | ||||
Files [
++] | ||||
No files present. |