![]() ![]() VLC version 2.7.8 has been tested on iOS 10.3.3 and found to be vulnerable. CODE : - (NSObject *)_httpGETDownloadForPath:(NSString *)path Vulnerable / Tested Versions URL : METHOD : GET EXAMPLE : The source code excerpt below shows the vulnerable code of the mobile app: The example below shows how the LFD vulnerability can be exploited. Proof Of Concept 1) Local file disclosure An attacker can read any files which can be accessed with current application privileges. VLC is a free and open-source media player that supports a wide range of video. The ‘Sharing over WiFi’ feature in VLC for iOS is vulnerable to a local file disclosure vulnerability. First, you need to install VLC media player on your computer or mobile device. Vulnerability Overview/ Description 1) Local file disclosure From there youll be able to type in the IP. SEC Consult recommends not to enable “Sharing over WiFi” feature in VLC for iOS which allows wireless file transfer to/from PC until a thorough security review has been performed by security professionals and all identified issues have been resolved. To use WiFi Share, open up VLC Media Player on your computer and click on Open Network Stream on the main page. ![]() The identified vulnerability allows attackers to steal arbitrary files (accessible by the app) from the mobile device. ![]() “VLC is a free and open source cross-platform multimedia player and framework that plays most multimedia files as well as DVDs, Audio CDs, VCDs, and various streaming protocols.” ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |