The Metaclassy Byword app 2.x before 2.1 for iOS does not require confirmation of Replace file actions, which allows remote attackers to overwrite arbitrary files via the name and text parameters in a byword://replace URL.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2013-09/0145.html - Exploit |
Information
Published : 2013-10-01 00:55
Updated : 2024-11-21 01:58
NVD link : CVE-2013-5725
Mitre link : CVE-2013-5725
CVE.ORG link : CVE-2013-5725
JSON object : View
Products Affected
metaclassy
- byword
CWE
CWE-264
Permissions, Privileges, and Access Controls