vendor:
Air Files
by:
R3d@l3rt, Sunlight, H@ckk3y
7.5
CVSS
HIGH
Directory Traversal
22
CWE
Product Name: Air Files
Affected Version From: 2.6
Affected Version To: 2.6
Patch Exists: NO
Related CWE: N/A
CPE: a:apple:air_files
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: iPhone, iPod 3GS with 4.2.1 firmware
2011
Air Files v2.6 for iPhone / iPod touch, Directory Traversal
There is directory traversal vulnerability in the Air Files. Exploit Testing involves using FTP to connect to the device and using the 'get' command to traverse the directory structure and access sensitive files such as the passwd and com.apple.conference.plist files.
Mitigation:
Ensure that the application is not vulnerable to directory traversal attacks by validating user input and restricting access to sensitive files.