Back to list
iAuto Mobile Application 2012 - Multiple Web Vulnerabilities
Aug 05 2012 11:57PM
Vulnerability Lab (research vulnerability-lab com)
iAuto Mobile Application 2012 - Multiple Web Vulnerabilities
Common Vulnerability Scoring System:
With Internet on mobile devices booming, having a desktop-oriented version is just not enough anymore. Empower your
visitors with content designed for mobile Web by offering them a mobile version of your classifieds website.
WorksForWeb is offering custom-made mobile frontend addons for our classified solutions. The mobile version of your
website will present all the data of the regular website in the format optimized for iPhone, Android, iPad, BlackBerry,
Symbian, or other mobile devices. Mobile frontend addon features:
Quick and advanced search,
And much more
Addon is seamlessly integrated with your main website. Your website automatically detects mobile browsers to redirect
mobile visitors to the mobile-optimized content. Why do you need a mobile gateway to your website? Because all the market
leaders have mobile access, and so should you. The mobile technology is redefining our future, and you should be one step
ahead of your smaller competitors. Mobile users now make up a large percentage of your target audience, and their needs
to access information easily are important to address. At this moment, the mobile addon is compatible with classified
solutions of v.5.2 and above. The price of the mobile frontend addon is only $175. This price includes a free expert
installation on your server.
(Copy of the Vendor Homepage: http://www.worksforweb.com/classifieds-software/addons/mobile-addon/ )
The Vulnerability Laboratory Research Team discovered multiple cross site vulnerabilities in the iAuto Mobile APP for Android, iOS & Blackberry.
2012-07-10: Public or Non-Public Disclosure
A persistent input validation vulnerability is detected in the iAuto Mobile APP for Android, iOS (iPhone), Ericsson & Blackberry.
The bugs allow remote attackers to implement/inject malicious script code on the application side (persistent). The persistent vulnerability
is located in comments module with the bound vulnerable commentSid parameter. Successful exploitation of the vulnerability can lead to session
hijacking (manager/admin) or stable (persistent) context manipulation. Exploitation requires low user inter action & privileged user account.
[+] Comments > Reply to The Comment Listing
[+] commentSid & commentInfo
Multiple non persistent cross site scripting vulnerabilities are detected in the iAuto Mobile APP for Android, iOS (iPhone), Ericsson & Blackberry.
The vulnerability allows remote attackers to hijack website customer, moderator or admin sessions with medium or high required user inter action or
local low privileged user account. The bugs are located in the Dealer > Search Sellers or Browse by Make and Model with the bound vulnerable
parameters city & path/url. Successful exploitation can result in account steal, client side phishing & client-side content request manipulation.
Exploitation requires medium or high user inter action & without privileged web application user account.
[+] Dealer > Search Sellers > City
[+] Browse by Make and Model > /../ >
[+] Folder Access Listing
Proof of Concept:
The persistent vulnerabilities can be exploited by remote attackers with low privileged user account and with low required user inter action.
For demonstration or reproduce ...
Review: Add Comments - Listing
<h1>Reply to The Comment</h1>
<div class="commentInfo">You are replying to the comment
en/[PERSISTENT INJECTED CODE!])' <="" to=""
listing="" #448="" "<span="" class="fieldValue fieldValueYear" height="900" width="1000">2007</span>
<span class="fieldValue fieldValueMake">Acura</span>
The client side cross site scripting vulnerabilities can be exploited by remote attackers with medium or highr equired user inter action.
Fo demonstration or reproduce ...
String: "><iframe src=http://vuln-lab.com width=1000 height=900 onload=alert("VulnerabilityLab") <
Dealer > Search Sellers > City
Browse by Make and Model / AC Cobra / >
Comments > Reply to The Comment > Topic & Text (commentSid)
The security risk of the persistent input validation vulnerability is estimated as medium(+).
The security risk of the non-persistent cross site scripting vulnerabilities are estimated as low(+)|(-)medium.
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri (bkm (at) vulnerability-lab (dot) com [email concealed])
The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties,
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business
profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some
states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation
may not apply. We do not approve or encourage anybody to break any vendor licenses, policies, deface websites, hack into databases
or trade with fraud/stolen material.
Domains: www.vulnerability-lab.com - www.vuln-lab.com - www.vulnerability-lab.com/register
Contact: admin (at) vulnerability-lab (dot) com [email concealed] - support (at) vulnerability-lab (dot) com [email concealed] - research (at) vulnerability-lab (dot) com [email concealed]
Section: video.vulnerability-lab.com - forum.vulnerability-lab.com - news.vulnerability-lab.com
Social: twitter.com/#!/vuln_lab - facebook.com/VulnerabilityLab - youtube.com/user/vulnerability0lab
Feeds: vulnerability-lab.com/rss/rss.php - vulnerability-lab.com/rss/rss_upcoming.php - vulnerability-lab.com/rss/rss_news.php
Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory.
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other
media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, sourcecode, videos and
other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed),
modify, use or edit our material contact (admin (at) vulnerability-lab (dot) com [email concealed] or support (at) vulnerability-lab (dot) com [email concealed]) to get a permission.
Copyright © 2012 | Vulnerability Laboratory
VULNERABILITY RESEARCH LABORATORY
LABORATORY RESEARCH TEAM
CONTACT: research (at) vulnerability-lab (dot) com [email concealed]
[ reply ]
Copyright 2010, SecurityFocus