vendor:
Video WiFi Transfer/MP4 Conversion
by:
Vulnerability Laboratory Research Team
6,7
CVSS
HIGH
Directory Traversal
22
CWE
Product Name: Video WiFi Transfer/MP4 Conversion
Affected Version From: 1.01
Affected Version To: 1.01
Patch Exists: N/A
Related CWE: N/A
CPE: a:bluefinger_apps:video_wifi_transfer/mp4_conversion:1.01
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: iOS Mobile Web Application
2014
Video WiFi Transfer 1.01 – Directory Traversal Vulnerability
A directory traversal web vulnerability has been discovered i the official Bluefinger App Video WiFi Transfer/MP4 Conversion v1.01 iOS mobile application. The vulnerability allows remote attackers to traverse directories and read sensitive files from the mobile web-application. The vulnerability is located in the `file` value of the `/download` POST method request. Remote attackers are able to inject malicious path traversal strings to read sensitive files from the mobile web-application.
Mitigation:
Ensure that user input is properly sanitized and validated to prevent malicious path traversal strings from being injected.