The Metaclassy Byword app 2.x before 2.1 for iOS does not require confirmation of Replace file actions, which allows remote attackers to overwrite arbitrary files via the name and text parameters in a byword://replace URL.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2013-09/0145.html | Exploit |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2013-10-01 00:55
Updated : 2013-10-08 21:21
NVD link : CVE-2013-5725
Mitre link : CVE-2013-5725
CVE.ORG link : CVE-2013-5725
JSON object : View
Products Affected
metaclassy
- byword
CWE
CWE-264
Permissions, Privileges, and Access Controls