Document Title:
===============
My.WiFi USB Drive v1.0 iOS - File Upload Web Vulnerability
Date:
=====
2015-09-23
References:
===========
http://www.vulnerability-lab.com/get_content.php?id=1589
VL-ID:
=====
1589
Common Vulnerability Scoring System:
====================================
7.6
Introduction:
=============
My WiFi USB drive. Files can be uploaded with any browser. Start the WiFi Drive web server from application and connect to it using any browser.
Use the iPod/iPhone’s/iPad`s available disk space to carry any files. Use your iPhone as a normal shared network drive!
(Copy of the Vendor Homepage: https://itunes.apple.com/us/app/my.wifi-usb-drive-+-free-pdf/id979512705 )
Abstract:
=========
The Vulnerability Laboratory Core Research Team discovered an unrestricted file upload web vulnerability in the My.WiFi USB Drive v1.0 iOS mobile web-application.
Report-Timeline:
================
2015-09-24: Public Disclosure (Vulnerability Laboratory)
Status:
========
Published
Affected Products:
==================
Jiyeon Lee
Product: My.WiFi USB Drive - iOS Mobile (Web-Application) v1.0
Exploitation-Technique:
=======================
Local
Severity:
=========
High
Details:
========
A file upload web vulnerability has been discovered in the official My.WiFi USB Drive v1.0 iOS mobile web-application.
The unrestricted file upload web vulnerability allows remote attackers to upload an arbitrary (malicious) files to
compromise the iOS web-application.
The vulnerability is located in the `filename` parameter of the `Upload Files` module. Remote attackers are able to manipulate the
filename value and can replace or overwrite the local files in the application path. The request method to upload the malicious
context is POST and the attack vector is located on the application-side of the mobile iOS web-application.
The security risk of the file upload vulnerability is estimated as high with a cvss (common vulnerability scoring system) count of 7.6.
Exploitation of the unrestricted file upload web vulnerability requires no user interaction or privileged web-application user account.
Successful exploitation of the vulnerability results in mobile application compromise and compromise of connected device components.
Proof of Concept:
=================
The unrestricted file upload web vulnerability can be exploited by remote attackers without privileged web-application user account or user interaction.
For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue.
PoC: Source