Document Title: =============== Zoll Checklist v1.2.2 iOS - Multiple Persistent Vulnerabilities References (Source): ==================== http://www.vulnerability-lab.com/get_content.php?id=1881 Release Date: ============= 2016-07-27 Vulnerability Laboratory ID (VL-ID): ==================================== 1881 Common Vulnerability Scoring System: ==================================== 3.6 Product & Service Introduction: =============================== The Checklist App is designed to give Fire and EMS agencies the ability to create customized daily, weekly or monthly vehicle checklists to ensure compliance and safety. Through ZOLL Online, you input the stations and vehicles that you will be checking. Then you can create custom vehicle checklist screens; capture employee signatures; and print or email a PDF copy for backup and storing. Download the ZOLL Checklist App from the Apple App Store. (Copy of the Vendor Homepage: https://www.zolldata.com/zochecklist/ https://itunes.apple.com/au/app/zoll-checklist/id643329756 ) Abstract Advisory Information: ============================== The vulnerability laboratory core research team discovered multiple application-side input validation vulnerabilities in the Zoll GmbH Checklist v1.2.2 mobile iOS application. Vulnerability Disclosure Timeline: ================================== 2016-07-27: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== ZOLL GmbH (ZOLL Data Systems Inc) Product: Checklist App - iOS Mobile (Web-Application) 1.2.2 Exploitation Technique: ======================= Remote Severity Level: =============== Medium Technical Details & Description: ================================ Multiple persistent input validation web vulnerabilities has been discovered in the official Zoll Checklist v1.2.2 mobile iOS application. The vulnerability allows local or remote attackers to inject own malicious script codes on the application-side of the affected vulnerable module. The vulnerability is located in the `name and address` input parameters of the `add item` module. Local attackers are able to inject own malicious script codes to the vulnerable values to compromise the affected `Reports` and `Share by Email` modules. The injection point of the vulnerability are the vulnerable marked input fields and the execution point occurs in the `Reports` on generate of the report and in the `Share by Email` module. Attacker are able to share the malicious generated reports in the complete menu and can as well to send spoofed malicious emails via the local app. The security risk of the application-side vulnerability is estimated as medium with a cvss (common vulnerability scoring system) count of 3.6. Exploitation of the persistent web vulnerability requires a low privileged ios device account with restricted access and without user interaction. Successful exploitation of the vulnerabilities results in persistent phishing mails, session hijacking, persistent external redirect to malicious sources and application-side manipulation of affected or connected module context. Vulnerable Module(s): [+] Add Vulnerable Parameter(s): [+] name [+] address Affected Module(s): [+] Reports - Complete [+] Share via Email Proof of Concept (PoC): ======================= The vulnerability can be exploited by local attackers with a low privileged ios device account or restricted access and with low user interaction. For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue. Manual steps to reproduce the vulnerability ... 1. Install the vulnerable Zoll Checklist iOS mobile application 2. Open the software 3. Add a new entry as item 4. Inject to the address and name values own malicious test script code 5. Save the entry 6. Let the report get generated to the complete menu 7. Opent the menu choose the report to trigger the application-side injected payload 8. Now, the attacker can as well use the share by email module via click button Note: The context of the report is transfered in html format to the email body context without secure approval 9. The code executes in the email body as second point of execution 10. Successful reproduce of both vulnerabilities in the mobile ios application. POC: Share via Email (HTML)