Printer Pro version 5.4.3 suffers from a cross site scripting vulnerability.
Document Title: =============== Printer Pro 5.4.3 IOS - Cross Site Scripting Credits & Authors: ================== TaurusOmar - @TaurusOmar_ (email@example.com) [taurusomar.blogspot.com] Release Date: ============= 2015-08-11 Product & Service Introduction: =============================== Print attachments, documents, web pages and more right from your iPhone and iPad to any Wi-Fi or USB printer. Printer Pro lets you wirelessly print from the iPhone or iPad. It can print directly to many Wi-Fi printers or any printer attached to your Mac or PC via helper application installed on your computer. Once installed, Printer Pro appears in the "Open In..." list on your device. This lets you print documents from Mail, PDF Expert and many other applications on your iPhone or iPad that support this function. (Copy of the Vendor Homepage: https://itunes.apple.com/us/app/printer-pro-print-documents/id393313223?mt=8) Abstract Advisory Information: ============================== An independent Vulnerability Laboratory researcher discovered multiple vulnerabilities in the official aplication Printer Pro 5.4.3. Vulnerability Disclosure Timeline: ================================== 2015-08-11: Public Disclosure Discovery Status: ================= Published Affected Product(s): ==================== Readdle Product: Printer Pro 5.4.3 - iOS Mobile Application Exploitation Technique: ======================= Local Severity Level: =============== Low Technical Details & Description: ================================ An application-side input validation vulnerability has been discovered in the officialPrinter Pro 5.4.3 iOS mobile application. The vulnerability allows a local attacker to inject own script code as payload to the application-side of the vulnerable service function or module. The vulnerability exists in the TextBox Name contacts in which injects the code is activated When the application is opened and the contact containing the script selects to print Request Method(s): [+] Import Vulnerable Module(s): [+] Add Contact Vulnerable Parameter(s): [+] TextBox Name Vulnerable Final(s): [+] Print Contact Proof of Concept (PoC): ======================= The persistent input validation web vulnerability can be exploited by local attackers with system user account and without . For security demonstration or to reproduce the security vulnerability follow the provided information and steps below to continue. 1. Install the ios application ( https://itunes.apple.com/us/app/printer-pro-print-documents/id393313223?mt=8) 2. Add new Contact with script in the TexBox Name 2. Start the app and open the import function 3. Select contact that contains the script 4. Successful reproduce of the persistent vulnerability! Proof of Concept (IMAGES): 1. http://i.imgur.com/yku1o1c.jpg 2. http://i.imgur.com/Q5O3X15.jpg 3. http://i.imgur.com/uPhL9Ow.jpg PoC: Cross Site Scripting <object data="data:text/html;base64,PHNjcmlwdD5hbGVydCgiVnVsbmVyYWJsZSIpOzwvc2NyaXB0Pg=="></object> Security Risk: ============== The security risk of the persistent input validation vulnerability in the name value is estimated as medium. (CVSS 3.7)
Quelle: Packet storm Security