Album Lock 4.0 on iOS /getImage filePaht path traversal

A vulnerability was found in Album Lock 4.0 on iOS and classified as critical. Affected by this issue is some unknown functionality of the file /getImage. The manipulation of the argument filePaht leads to path traversal. Using CWE to declare the problem leads to CWE-22. The weakness was presented 02/20/2017 by Benjamin Kunz Mejri as VL-ID 2033 as Advisory (Website). The advisory is shared for download at vulnerability-lab.com. This vulnerability is handled as CVE-2017-20102. Attacking locally is a requirement. Technical details are available. Furthermore, there is an exploit available. The exploit has been disclosed to the public and may be used. The current price for an exploit might be approx. USD $0-$5k at the moment. The MITRE ATT&CK project declares the attack technique as T1006. It is declared as proof-of-concept. The exploit is available at vulnerability-lab.com. As 0-day the estimated underground price was around $0-$5k. A possible mitigation has been published even before and not after the disclosure of the vulnerability.

Field02/24/2017 16:0708/17/2020 10:3906/25/2022 16:46
nameAlbum LockAlbum LockAlbum Lock
version4.04.04.0
platformiOSiOSiOS
file/getImage/getImage/getImage
argumentfilePahtfilePahtfilePaht
risk222
cvss2_vuldb_basescore3.03.03.0
cvss2_vuldb_tempscore2.62.62.6
cvss2_vuldb_ciPPP
cvss2_vuldb_iiPPP
cvss2_vuldb_aiNNN
cvss3_meta_basescore4.44.44.4
cvss3_meta_tempscore4.04.04.0
cvss3_vuldb_basescore4.44.44.4
cvss3_vuldb_tempscore4.04.04.0
cvss3_vuldb_cLLL
cvss3_vuldb_iLLL
cvss3_vuldb_aNNN
date1487548800 (02/20/2017)1487548800 (02/20/2017)1487548800 (02/20/2017)
locationWebsiteWebsiteWebsite
typeAdvisoryAdvisoryAdvisory
urlhttps://www.vulnerability-lab.com/get_content.php?id=2033https://www.vulnerability-lab.com/get_content.php?id=2033https://www.vulnerability-lab.com/get_content.php?id=2033
identifierVL-ID 2033VL-ID 2033VL-ID 2033
person_nameBenjamin Kunz MejriBenjamin Kunz MejriBenjamin Kunz Mejri
availability111
date1487548800 (02/20/2017)1487548800 (02/20/2017)1487548800 (02/20/2017)
publicity111
urlhttps://www.vulnerability-lab.com/get_content.php?id=2033https://www.vulnerability-lab.com/get_content.php?id=2033https://www.vulnerability-lab.com/get_content.php?id=2033
developer_nameBenjamin Kunz MejriBenjamin Kunz MejriBenjamin Kunz Mejri
price_0day$0-$5k$0-$5k$0-$5k
cvss2_vuldb_ePOCPOCPOC
cvss2_vuldb_rlNDNDND
cvss2_vuldb_rcURURUR
cvss3_vuldb_ePPP
cvss3_vuldb_rlXXX
cvss3_vuldb_rcRRR
cvss2_vuldb_avLLL
cvss2_vuldb_acMMM
cvss2_vuldb_auSSS
cvss3_vuldb_avLLL
cvss3_vuldb_acLLL
cvss3_vuldb_prLLL
cvss3_vuldb_uiNNN
cvss3_vuldb_sUUU
typeiOS App SoftwareiOS App Software
cwe022 (path traversal)22 (path traversal)
cveCVE-2017-20102
responsibleVulDB

Do you know our Splunk app?

Download it now for free!