Categories: CVE/vulnerability

Vulnerability with VLC for iOS Allows Attackers to Steal Data from Storage

A vulnerability with VLC for iOS allows local attackers to steal the data from the storage by just having the source URL/IP.

The vulnerability was discovered by the security researcher Dhiraj and the flaw resides in the functionality of the application for iOS.

Vulnerability with VLC for iOS

According to the researcher, the “VLC for iOS was vulnerable to an unauthenticated insecure direct object reference“, an attacker can exploit this vulnerability by just changing the “id”, “pid”, “uid” in the URL.

So the website or the application saves the request and it goes to the database and fetches different records than the permitted for the user.

Here the vulnerability resides in the functionality that allows users to share files with others over WiFi.

If two users sharing the video over Wi-Fi using vlc-iOS and the third user by just having the source IP can trigger a successfully unauthenticated IDOR.

It is a free VLC media player to iPad, iPhone, and iPod touch. It is a free open source cross-platform multimedia player and framework that plays most multimedia files.

The bug has been reported to VLC and it was fixed with version Version 3.2.7, which was released on March 25th.

Along with this, they fixed other bugs, here you can get the complete details.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Researchers Uncover SuperShell Payloads and Various Tools in Hacker’s Open Directories

Cybersecurity researchers at Hunt have uncovered a server hosting advanced malicious tools, including SuperShell command-and-control…

1 hour ago

Cyber Espionage Campaign Targets Uyghur Exiles with Trojanized Language Software

A sophisticated cyberattack targeted senior members of the World Uyghur Congress (WUC), the largest Uyghur…

1 hour ago

Konni APT Deploys Multi-Stage Malware in Targeted Organizational Attacks

A sophisticated multi-stage malware campaign, potentially orchestrated by the North Korean Konni Advanced Persistent Threat…

2 hours ago

Outlaw Cybergang Launches Global Attacks on Linux Environments with New Malware

The Outlaw cybergang, also known as “Dota,” has intensified its global assault on Linux environments,…

2 hours ago

Google Reports 75 Zero-Day Vulnerabilities Actively Exploited in the Wild

In a comprehensive report released by the Google Threat Intelligence Group (GTIG), 75 zero-day vulnerabilities…

2 hours ago

New Gremlin Stealer Advertised on Hacker Forums Targets Credit Card Data and Login Credentials

A formidable new information-stealing malware dubbed Gremlin Stealer has surfaced in the cybercrime underground, actively…

2 hours ago