CVE-2013-5725

The Metaclassy Byword app 2.x before 2.1 for iOS does not require confirmation of Replace file actions, which allows remote attackers to overwrite arbitrary files via the name and text parameters in a byword://replace URL.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:metaclassy:byword:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:metaclassy:byword:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:metaclassy:byword:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:metaclassy:byword:2.0.3:*:*:*:*:*:*:*

History

21 Nov 2024, 01:58

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/bugtraq/2013-09/0145.html - Exploit () http://archives.neohapsis.com/archives/bugtraq/2013-09/0145.html - Exploit

Information

Published : 2013-10-01 00:55

Updated : 2024-11-21 01:58


NVD link : CVE-2013-5725

Mitre link : CVE-2013-5725

CVE.ORG link : CVE-2013-5725


JSON object : View

Products Affected

metaclassy

  • byword
CWE
CWE-264

Permissions, Privileges, and Access Controls