Description: The application leaks internal file paths.
Severity Description: Understanding internal system structure may lead to further attacks on the system including directory traversing and forceful browsing. Furthermore, the file structure reveals the type of server implemented.
Exploitability: An information leak is the intentional or unintentional disclosure of information that either (1) is regarded as sensitive within the product's own functionality, such as a private message, or (2) provides information about the product or its environment that could be useful in an attack but is normally not available to the attacker, such as the installation path of a product that is remotely accessible. Many information leaks are resultant (e.g. path disclosure in PHP script error), but they can also be primary (e.g. timing discrepancies in crypto). There are many different types of problems that involve information leaks. Their severity can range widely depending on the type of information that is leaked.
Location: Mach-O 64-bit arm64 binary
Attack Vectors Strings saved in file
Exhibits The following screenshot demonstrates the presence of the Full Path Disclosure vulnerability.
Reproduction Steps:
- Download the mobile application on your iOS device.
- Connect to your device using SSH.
- Navigate to the path where the application is installed.
- The path for installed applications on iOS devices is: "/var/containers/Bundle/Application/{uuid}" 5. Locate the "ApplicationName" binary within the "App.app" directory.
- Use the "strings" application to extract strings from the binary.
- The syntax is as follows: "strings ApplicationName | grep -i '/Users/"
- The binary exposes multiple paths of the development environment.
How to fix the issue.