An arbitrary file upload vulnerability has been discovered in the Super File Explorer app 1.0.1 for iOS. The vulnerability is located in the developer path that is accessible and hidden next to the root path. By default, there is no password set for the FTP or Web UI service.
References
Link | Resource |
---|---|
https://apps.apple.com/us/app/super-file-explorer-file-viewer-file-manager/id1101973946 | Product Third Party Advisory |
https://gist.github.com/adeshkolte/9e60b2483d2f20d1951beac0fc917c6f | Third Party Advisory |
https://apps.apple.com/us/app/super-file-explorer-file-viewer-file-manager/id1101973946 | Product Third Party Advisory |
https://gist.github.com/adeshkolte/9e60b2483d2f20d1951beac0fc917c6f | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:38
Type | Values Removed | Values Added |
---|---|---|
References | () https://apps.apple.com/us/app/super-file-explorer-file-viewer-file-manager/id1101973946 - Product, Third Party Advisory | |
References | () https://gist.github.com/adeshkolte/9e60b2483d2f20d1951beac0fc917c6f - Third Party Advisory |
Information
Published : 2020-01-28 05:15
Updated : 2024-11-21 05:38
NVD link : CVE-2020-7998
Mitre link : CVE-2020-7998
CVE.ORG link : CVE-2020-7998
JSON object : View
Products Affected
super_file_explorer_project
- super_file_explorer
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type