Document Title: =============== Wireless Drive v1.1.0 iOS - Multiple Web Vulnerabilities References (Source): ==================== http://www.vulnerability-lab.com/get_content.php?id=1229 Release Date: ============= 2014-03-19 Vulnerability Laboratory ID (VL-ID): ==================================== 1229 Common Vulnerability Scoring System: ==================================== 6.8 Product & Service Introduction: =============================== Why carry a physical USB drive around wherever you go, cluttering up your key ring? Instead, this simple, convenient app converts your iOS device into a wireless hard drive that works over WiFi! Simple. Powerful. Convenient. Wireless Drive: One of those apps you`ll end up using all the time! Features: - Transfer files without limitation - Support files in any format and size - Use WiFi or iTunes File Sharing to transfer files between your iOS device and computer - Perfect app for transporting large collections of video - Use it to transfer work documents from office to home, simple and easily (Copy of the Homepage: https://itunes.apple.com/de/app/wireless-drive-transfer-share/id569832333 ) Abstract Advisory Information: ============================== The Vulnerability Laboratory Research Team discovered multiple web vulnerabilities in the official OnDemandWorld Wireless Drive v1.1.0 mobile web-application. Vulnerability Disclosure Timeline: ================================== 2014-03-19: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== OnDemandWorld Product: Wireless Drive - Transfer & Share Files over WiFi 1.1.0 Exploitation Technique: ======================= Remote Severity Level: =============== High Technical Details & Description: ================================ 1.1 A local file include web vulnerability has been discovered in the official OnDemandWorld Wireless Drive v1.1.0 iOS mobile web-application. The local file include web vulnerability allows remote attackers to unauthorized include local file/path requests or system specific path commands to compromise the web-application or mobile device. The web vulnerability is located in the `filename` value of the `Upload file` module. Remote attackers are able to inject own files with malicious `filename` value in the upload POST method request to compromise the mobile web-application. The attack vector is persistent and the request method is POST. The local file/path include execution occcurs in the main file dir list. The security risk of the local file include web vulnerability is estimated as high(+) with a cvss (common vulnerability scoring system) count of 6.7(+)|(-)6.8. Exploitation of the local file include web vulnerability requires no user interaction but a privileged web-application user account with low user auth. Successful exploitation of the local file include web vulnerability results in mobile application or connected device component compromise. Request Method(s): [+] [POST] Vulnerable Module(s): [+] Upload file Vulnerable Parameter(s): [+] filename Affected Module(s): [+] Upload > Menu File Dir List (http://localhost:4096) 1.2 A local command/path injection web vulnerabilities has been discovered in the official OnDemandWorld Wireless Drive v1.1.0 iOS mobile web-application. A command inject vulnerability allows attackers to inject local commands via vulnerable system values to compromise the apple mobile iOS application. The vulnerability is located in the vulnerable `[foldername]` value of the wifi file dir list module. Local attackers are able to inject own malicious system specific commands or path value requests in the vulnerable foldername value. The injection requires a active sync with the wifi app stored folders. The execution of the local command inject via foldername value on sync occurs in the file dir index list of the main upload path. The security risk of the local command/path inject vulnerability is estimated as high(-) with a cvss (common vulnerability scoring system) count of 5.6(+)|(-)5.7. Exploitation of the command/path inject vulnerability requires a low privileged iOS device account with restricted access and no user interaction. Successful exploitation of the vulnerability results in unauthorized execution of system specific commands and unauthorized path value requests to compromise the mobile iOS application or the connected device components. Request Method(s): [+] Sync Vulnerable Parameter(s): [+] foldername (path value) Affected Module(s): [+] Index- File Dir Listing [+] Sub Folder/Category - File Dir Listing Proof of Concept (PoC): ======================= 1.1 The local file include web vulnerability can be exploited by remote attackers without user interaction and with low privileged web-interface account. For security demonstration or to reproduce the security vulnerability follow the provided information and steps below to continue. PoC: Upload File > filename [Sub Dir]