vendor:
iPhone/iPad Phone Drive
by:
Khashayar Fereidani
7.5
CVSS
HIGH
Directory Traversal
22
CWE
Product Name: iPhone/iPad Phone Drive
Affected Version From: 1.1.2001
Affected Version To: 1.1.2001
Patch Exists: NO
Related CWE: N/A
CPE: a:apple:iphone_ipad_phone_drive
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: iPhone 4 (IOS 4.3.3/Jailbroken)
2011
iPhone/iPad Phone Drive 1.1.1 Directory Traversal
iPhone/iPad Phone Drive 1.1.1 is vulnerable to a directory traversal attack which allows an attacker to read arbitrary files from the server. This vulnerability is due to insufficient sanitization of user-supplied input to the 'url' parameter. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing directory traversal characters (e.g. '../') to the vulnerable server. Successful exploitation will allow the attacker to read arbitrary files from the server.
Mitigation:
Input validation should be used to prevent directory traversal attacks. All user-supplied input should be validated and filtered to ensure that it does not contain any malicious characters.