Document Title: =============== iVault Private P&V 1.1 iOS - Path Traversal Vulnerability References (Source): ==================== http://www.vulnerability-lab.com/get_content.php?id=1253 Release Date: ============= 2014-04-09 Vulnerability Laboratory ID (VL-ID): ==================================== 1253 Common Vulnerability Scoring System: ==================================== 6.8 Product & Service Introduction: =============================== The BEST and MOST convenient private Photo&Video App! It provides multiple security mechanisms, and perfectly keeps your privacy away from peeping eyes. First, you need to add your ‘SPECIAL’ photos&videos into iVault, it provides many convenient features. Second, you may concern about the security things. Third, iVault can provide more than you can imagine. (Copy of the Homepage: https://itunes.apple.com/us/app/ivault-private-photo.s-video.s/id780124144 ) Abstract Advisory Information: ============================== The Vulnerability Laboratory Research Team discovered multiple vulnerabilities in the official iVault Private Photos & Videos v1.1 iOS mobile application. Vulnerability Disclosure Timeline: ================================== 2014-04-09: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== Arvin Brook Product: iVault - Private Photos & Videos Vault + Secrets Folders Manager 1.1 Exploitation Technique: ======================= Remote Severity Level: =============== High Technical Details & Description: ================================ The application-side path/directory traversal web vulnerability has been discovered in the official iVault Private Photos & Videos v1.1 iOS mobile application. The vulnerability allows an local attacker to unauthorized access path- or directories values to leak information or compromise the mobile application privacy. The first vulnerability is located in the `path & directory` value of the wifi web-access module. Remote attackers are able to request the via vulnerable path value any application content even if protected. The attackers are able to include local frames as path value to request an internal application path to unauthorized access stored private images/files. The issue can be combined with script-code attacks but is not limited to the condition only. The attack vector is located on the application-side and the method to include the malicious path value request is a sync (device). The security risk of the directory traversal vulnerability is estimated as medium with a cvss (common vulnerability scoring system) count of 6.8(+)|(-)6.9. Exploitation of the local `path & directory` vulnerability requires a low privileged device user account with physical device access and without user interaction. Successful exploitation of the vulnerability results in unauthorized picture or file access, information disclosure and further application-side attacks. Vulnerable Input(s): [+] Path Vulnerable Module(s): [+] Directory Vulnerable Parameter(s): [+] Oberverzeichnis > aktuell:(x) Affected Module(s): [+] Path Dir Listing (each WiFi web access side) Proof of Concept (PoC): ======================= The application-side vulnerability can be exploited by local attackers with physical device access and low privileged user account. User interaction is not required. For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue. PoC: Source