|
Message-id: <495b6b69-11f4-4f7d-a341-28b8dc704c30@me.com>
Date: Thu, 29 Aug 2013 18:35:00 +0000 (GMT)
From: "Larry W. Cashdollar" <larry0@...com>
To: Open Source Security <oss-security@...ts.openwall.com>
Subject: YingZhi Python Programming Language for iOS ftp .. bug & httpd
arbitrary upload
Hi,
I'd like to request a CVE for these vulnerabilities I disclosed back on Sept 27 2012.
YingZhi Python Programming Language for iOS
Vendor: XiaoWen Huang, YingZhi Python for iOS.
Ver 1.9.
OSVDB IDs: 96719 & 96720
Product Websites
http://sosilen.blog.163.com
http://www.iphoneappstorm.com/iphone-apps/utilities/com.yingzhi.python/yingzhipython.php?id=493505744 YingZhi
Description:
Python Interpreter is a native python development application for the iPad/iPhone. It is available for iOS 4 and above.
The product is packaged with its own httpd and ftpd servers. Enabling the local daemons for development by Touching Computer<->This Machine starts up an httpd server and ftpd server, both daemons are bound to device IP not localhost.
Vulnerabilities:
httpd server allows upload of arbitrary files to root WWW directory.
Browsing to http://<target_ip>:8080/ presents an index page in which anyone can upload files to the web servers root
directory.
ftp server vulnerable to ../ bug
The ftp server doesn't sanitize user input and allows remote users to read and possibly write to the devices storage.
ftp://192.168.0.24:10000/../../../../../../../private/etc/passwd
The ftp server doesn't bother authenticating users, any username/password combination will allow you in.
Larry W. Cashdollar @_larry0
http://vapid.dhs.org/advisories/python_for_ipad.html
http://seclists.org/fulldisclosure/2012/Sep/199
Content of type "text/html" skipped
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.