WiFi web access
<./[LOCAL FILE INCLUDE VULNERABILITY!].TXT" class="document" onclick="aClickHandler(this);" style="position:relative; text-decoration:none;">
Document Title: =============== Photorange v1.0 iOS - File Include Web Vulnerability References (Source): ==================== http://www.vulnerability-lab.com/get_content.php?id=1318 Release Date: ============= 2014-09-07 Vulnerability Laboratory ID (VL-ID): ==================================== 1318 Common Vulnerability Scoring System: ==================================== 6.3 Product & Service Introduction: =============================== The BEST and MOST Convenient Private Photo & Video & Docs App! Photorange provides a secure Password System to keep your secret files 100% private. Your files are ONLY stored on your device and we can never touch them. ( Copy of the Vendor Homepage: https://itunes.apple.com/en/app/photorange-schutz-privat-foto/id896041290 ) Abstract Advisory Information: ============================== The Vulnerability Laboratory discovered a local file include web vulnerability in the official Photorange v1.0 iOS mobile web-application. Vulnerability Disclosure Timeline: ================================== 2014-09-08: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== Jiajun Kuang Product: Photorange - iOS Mobile Web Application 1.0 Exploitation Technique: ======================= Local Severity Level: =============== High Technical Details & Description: ================================ A local file include web vulnerability has been discovered in the official Photorange v1.0 iOS mobile web-application. The local file include web vulnerability allows remote attackers to unauthorized include local file/path requests or system specific path commands to compromise the mobile web-application. The web vulnerability is located in the `filename` value of the `add file` module. Remote attackers are able to inject own files with malicious `filename` values in the `sync` device POST method request to compromise the mobile web-application. The local file/path include execution occcurs in the file dir index web interface through the download path next to the vulnerable name/path value. The attacker is able to inject the local file request by usage of the available `wifi interface` for file exchange via sync. Remote attackers are also able to exploit the filename validation issue in combination with persistent injected script codes to execute different local malicious attack requests. The attack vector is on the application-side of the wifi service and the request method to inject is POST via Sync. The security risk of the local file include web vulnerability is estimated as high with a cvss (common vulnerability scoring system) count of 6.3. Exploitation of the local file include web vulnerability requires no privileged web-application user account but low user interaction. Successful exploitation of the local file include web vulnerability results in mobile application or connected device component compromise. Request Method(s): [+] [Sync] [POST] Vulnerable Parameter(s): [+] filename Affected Module(s): [+] Index File Dir Listing (Web Interface - http://localhost:9900/ ) Proof of Concept (PoC): ======================= The local file include web vulnerability can be exploited by local attackers without privileged application user account or user interaction. For security demonstration or to reproduce the security vulnerability follow the provided information and steps below to continue. PoC: Exploit http://localhost:9900/%3E%22%3E%3C./[LOCAL FILE INCLUDE VULNERABILITY!]%3E.TXT http://localhost:9900/Download/%3E%22%3E%3C./[LOCAL FILE INCLUDE VULNERABILITY!]%3E.TXT PoC: Web Interface - Index Dir Listing