Document Title: =============== Folder Lock v3.4.5 iOS - Multiple Web Vulnerabilities References (Source): ==================== https://www.vulnerability-lab.com/get_content.php?id=2210 Release Date: ============= 2020-04-20 Vulnerability Laboratory ID (VL-ID): ==================================== 2210 Common Vulnerability Scoring System: ==================================== 4.2 Vulnerability Class: ==================== Multiple Current Estimated Price: ======================== 500€ - 1.000€ Product & Service Introduction: =============================== Folder Lock lets you password-protect your personal files, photos, videos, documents, contacts, wallet cards, notes and audio recordings in your iPhone. Apart from being a perfect data security app, Folder Lock is a perfect WiFi manager app too, as you can transfer files from your iPhone to PC, or vice versa, wireless via Folder Lock. Its WiFi Music Manager feature allows you the options of audio import, music import, song import and mp3 import without using iTunes. (Copy of the Homepage: https://apps.apple.com/us/app/folder-lock/id372925917 ) Abstract Advisory Information: ============================== The vulnerability laboratory core research team discovered multiple web vulnerabilities in the official Folder Lock v3.4.5 mobile ios application. Affected Product(s): ==================== NewSoftwares.net Product: Folder Lock v3.4.5 - Apple iOS Mobile Web Application Vulnerability Disclosure Timeline: ================================== 2020-04-20: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Exploitation Technique: ======================= Remote Severity Level: =============== Medium Authentication Type: ==================== No authentication (guest) User Interaction: ================= Low User Interaction Disclosure Type: ================ Independent Security Research Technical Details & Description: ================================ 1.1 Multiple persistent cross site scripting vulnerability has been discovered in the official Folder Lock v3.4.5 mobile ios application. The vulnerability allows remote attackers to inject own malicious script codes with persistent attack vector to compromise browser to web-application requests from the application-side. The persistent input validation vulnerability is located in the `create` module with the `Create Folder` function. Remote attackers are able to inject own malicious persistent script codes as path or foldername. After the inject the code executes persistent from the application-side. The request method to inject is POST and the attack vector is located on the application-side. The injection point is the create folder function and the execution point occurs with any path/file index dir listing on preview. Successful exploitation of the vulnerability results in session hijacking, persistent phishing attacks, persistent external redirects to malicious source and persistent manipulation of affected application modules. Request Method(s): [+] POST Vulnerable Function(s): [+] Create Folder Vulnerable Module(s): [+] path 1.2 Multiple non-persistent cross site web vulnerabilities has been discovered in the official Folder Lock v3.4.5 mobile ios application. The vulnerability allows remote attackers to inject own malicious script codes with non-persistent attack vector to compromise browser to web-application requests from the client-side. The non-persistent cross site scripting vulnerabilities are located in the `path` parameter of the `list` and `download` module. Remote attackers are able to inject own malicious script code to client-side requests with non-persistent attack vector. The request method to inject is GET and the attack vector is located on the client-side. The injection point is the vulnerable `path` parameter and the execution occurs in the not sanitized error exception output message. Successful exploitation of the vulnerability results in session hijacking, non-persistent phishing attacks, non-persistent external redirects to malicious source and non-persistent manipulation of affected application modules. Request Method(s): [+] GET Vulnerable Module(s): [+] ./list [+] ./download Vulnerable Parameter(s): [+] path Proof of Concept (PoC): ======================= 1.1 The persistent input validation web vulnerability can be exploited by remote attackers with wifi ui access with low user interaction. For security demonstration or to reproduce the security vulnerability follow the provided information and steps below to continue. PoC: Vulnerable Source --- PoC Session Logs (POST) --- [Create Folder] http://localhost/create Host: localhost User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0 Accept: application/json, text/javascript, */*; q=0.01 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded; charset=UTF-8 X-Requested-With: XMLHttpRequest Content-Length: 89 Origin: http://localhost Connection: keep-alive Referer: http://localhost/ Cookie: _ga=GA1.4.376521534.1586884411; _gid=GA1.4.1374601525.1586884411 path=/Audios/test">