exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Base Soundtouch 18.1.4 Cross Site Scripting

Base Soundtouch 18.1.4 Cross Site Scripting
Posted Jan 7, 2019
Authored by Tim Schughart

Base Soundtouch iOS application version 18.1.4 suffers from a cross site scripting vulnerability.

tags | exploit, xss
systems | ios
advisories | CVE-2018-12638
SHA-256 | 67c8211022b176ba9ad191b333fa8db82dec6bea662fcf9aeb2fdd2a726d151c

Base Soundtouch 18.1.4 Cross Site Scripting

Change Mirror Download
CWE-80 XSS Bose Soundtouch App 

Internal reference: -
Vulnerability type: Cross-Site Scripting (CWE-80)
Vulnerable version: 18.1.4 and maybe older versions, too (not tested)
Vulnerable component: IOS Frontend of the application
Report confidence: Unconfirmed
Solution status: Could be fixed by vendor?
Fixed version: -
Vendor notification: 2018-06-21
Solution date: ?
CVE reference: CVE-2018-12638
CVSSv3: Calculator: 4.3 AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N <https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/CR:X/IR:X/AR:X/MAV:N/MAC:X/MPR:N/MUI:R/MS:U/MC:H/MI:N/MA:N>
Researcher Credits: Tim Schughart

Vulnerability Details:
The smartphone name isnat filtered properly and is reflected unfiltered to
the app. This results in an cross site scritping, if you just connect to the Bose box via the app.

Risk:
Malicious javascript code can be executed within a users context. This can lead to session hijacking or triggering unwanted actions via the interface.

Steps to reproduce:
Just name your iOS device in a<script>alert(1)</script>a and pair your box with your smartphone via the app. Many popups will occur.

Solution:
You should filter the input (the name of connected device)


An issue was discovered in the Bose Soundtouch app 18.1.4 for iOS.
There is no frontend input validation of the device name. A malicious
device name can execute JavaScript on the
registered Bose User Account if a speaker has been connected to the app.

History:
2018-07-17 Informed Vendor about the Security Issue
2019-01-02 No response from vendor
2019-01-02 Public release


Best regards / Mit freundlichen GrA1/4Aen

Chris Hein
Penetrationtester

--
ProSec GmbH
Robert-Koch-StraAe 1-9
56751 Polch

Website: https://www.prosec-networks.com
E-Mail: c.hein@prosec-networks.com
Phone: +49 (0)261 450 930 90

Sitz der Gesellschaft / company domiciled in: Polch
Registergericht / registry court: Amtsgericht Koblenz, HRB 26457
GeschA$?ftsfA1/4hrer / chief executive: Tim Schughart
USt-IdNr./ VAT ID: DE290654714

"This E-Mail communication may contain CONFIDENTIAL, PRIVILEGED and/or LEGALLY PROTECTED information and is intended only for the named recipient(s). Any unauthorized use, dissemination, copying or forwarding is strictly prohibited. If you are not the intended recipient and have received this email communication in error, please notify the sender immediately, delete it and destroy all copies of this E-Mail."

"Diese E-Mail Mitteilung kann VERTRAULICHE, dem BERUFSGEHEIMNIS UNTERLIEGENDE und/oder RECHTLICH GESCHATZTE Informationen enthalten und ist ausschlieAlich fA1/4r den/die genannten Adressaten bestimmt. Jede unbefugte Nutzung, Weitergabe, VervielfA$?ltigung oder Versendung ist strengstens verboten. Sollten Sie nicht der angegebene Adressat sein und diese E-Mail Mitteilung irrtA1/4mlich erhalten haben, informieren Sie bitte sofort den Absender, lAPschen diese E-Mail und vernichten alle Kopien."




Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close