Title: ====== withU Music Share v1.3.7 iOS - Command Inject Vulnerability Date: ===== 2013-08-03 References: =========== http://www.vulnerability-lab.com/get_content.php?id=1040 VL-ID: ===== 1040 Common Vulnerability Scoring System: ==================================== 6.1 Introduction: ============= You can use iPhone & iPad as music server. You can also listen music from other media servers. withU is Music Streamer & Music Streaming Player over Wi-Fi connection! (UPnP/DLNA compatible) withU lets you stream your iPod Music Library to - iOS Devices (iPhone, iPad, iPod Touch) - Gaming Consoles (XBox 360, PS3) - Web Browsers (Safari, Chrome) - PC Applications (Windows Media Player , Plex, XBMC, etc.) withU also helps you listen Music from Windows 7 PC or PC applications such as Plex, XBMC Media Server, PlayStation Media Server, MediaTomb. ( Copy of the Homepage: https://itunes.apple.com/us/app/withu-music-share-free-version/id567979632 ) Abstract: ========= The Vulnerability Laboratory Research Team discovered a command/path inject vulnerability in the withU v1.3.7 Music-Share application (Apple iOS - iPad & iPhone). Report-Timeline: ================ 2013-08-03: Public Disclosure (Vulnerability Laboratory) Status: ======== Published Affected Products: ================== Apple AppStore Product: withU - Music Share Application 1.3.7 Exploitation-Technique: ======================= Local Severity: ========= High Details: ======== A local command/path injection web vulnerability is detected in the withU v1.3.7 Music-Share application (Apple iOS - iPad & iPhone). The vulnerability allows to inject local commands via vulnerable system values to compromise the apple mobile iOS application. The vulnerability is located in the index file dir (header) listing module when processing to request and list the ipad or iphone devicename. Local attackers can change the name of the device to inject the code and request any local path or inject commands on application-side. The malicious context with the path request executes when an user or victim is watching the file dir index listing. Exploitation of the web vulnerability requires a local privilege iOS device account with restricted access and no user interaction. Successful exploitation of the vulnerability results unauthorized execution of system specific commands and path requests. Vulnerable Application(s): [+] withU v1.3.7 - ITunes or AppStore (Apple) Vulnerable Module(s): [+] Top Bar Vulnerable Parameter(s): [+] device name Affected Module(s): [+] Listing (INDEX & SUB CATEGORIES) - Page Header Proof of Concept: ================= The local command/path inject web vulnerability can be exploited by local attackers with physical device access and no user interaction. For demonstration or reproduce ... PoC: Header - Device Name as Title
Free version limits number of displayed items in album list.