The Metaclassy Byword app 2.x before 2.1 for iOS does not require confirmation of Replace file actions, which allows remote attackers to overwrite arbitrary files via the name and text parameters in a byword://replace URL.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2013-09/0145.html | Exploit |
Configurations
Configuration 1 (hide)
|
Information
Published : 2013-09-30 17:55
Updated : 2013-10-08 14:21
NVD link : CVE-2013-5725
Mitre link : CVE-2013-5725
JSON object : View
CWE
CWE-264
Permissions, Privileges, and Access Controls
Products Affected
metaclassy
- byword