Document Title: =============== Airdroid iOS, Android & Win 3.1.3 - Persistent Vulnerability References (Source): ==================== http://www.vulnerability-lab.com/get_content.php?id=1543 Release Date: ============= 2015-07-20 Vulnerability Laboratory ID (VL-ID): ==================================== 1543 Common Vulnerability Scoring System: ==================================== 3.9 Product & Service Introduction: =============================== AirDroid allows you to access wirelessly and for free on your Android phone or tablet from Windows, Mac or the Internet, and to control it. (Copy of the Product Homepage: https://www.airdroid.com/de/ ) Abstract Advisory Information: ============================== The Vulnerability Laboratory Core Research Team discovered an application-side input validation web vulnerability in the official SandStudio AirDroid (windows, ios and android) mobile web-application. Vulnerability Disclosure Timeline: ================================== 2015-07-05: Researcher Notification & Coordination (Hadji Samir) 2015-07-06: Vendor Notification (Security Team) 2015-07-20: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== Sand Studio Product: AirDroid iOS Application (Andoird, Windows, MacOS & Web) 3.1.3 Exploitation Technique: ======================= Remote Severity Level: =============== Medium Technical Details & Description: ================================ A persistent input validation web vulnerability has been discovered in the official SandStudio AirDroid (windows, ios and android) mobile web-application. The vulnerability allows remote attacker or low privilege user accounts to inject malicious codes to the application-side of the affected mobile web-application. The vulnerability is located in the send messages and the send message with an attached file module. Remote attackers with low privilege user account are able to upload file name with malicious strings like ``>