ID

VAR-201306-0306


CVE

CVE-2013-3948


TITLE

Apple iOS Vulnerabilities that trigger the installation of arbitrary applications

Trust: 0.8

sources: JVNDB: JVNDB-2013-002895

DESCRIPTION

Apple iOS 6.1.3 does not follow redirects during determination of the hostname to display in an iOS Enterprise Deployment installation dialog, which makes it easier for remote attackers to trigger installation of arbitrary applications via a download-manifest itms-services:// URL that leverages an open redirect vulnerability within a trusted domain. This vulnerability SyScan 2013 Was announced atExploit open redirect vulnerabilities inside trusted domains by third parties download-manifest In action itms-services:// URL Via, you may be triggered to install any application. Apple iOS is prone to an open-redirection vulnerability because it fails to properly sanitize user-supplied input. An attacker can leverage this issue by constructing a crafted URI and enticing a user to follow it. When an unsuspecting victim follows the link, they may be redirected to an attacker-controlled site; this may aid in phishing attacks. Other attacks are possible. Apple iOS 6.1.3 is vulnerable; other versions may also be affected

Trust: 1.98

sources: NVD: CVE-2013-3948 // JVNDB: JVNDB-2013-002895 // BID: 60438 // VULHUB: VHN-63950

AFFECTED PRODUCTS

vendor:applemodel:iphone osscope:eqversion:6.1.3

Trust: 1.6

vendor:applemodel:iosscope:eqversion:6.1.3

Trust: 1.1

sources: BID: 60438 // JVNDB: JVNDB-2013-002895 // CNNVD: CNNVD-201306-088 // NVD: CVE-2013-3948

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-3948
value: MEDIUM

Trust: 1.0

NVD: CVE-2013-3948
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201306-088
value: MEDIUM

Trust: 0.6

VULHUB: VHN-63950
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2013-3948
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-63950
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-63950 // JVNDB: JVNDB-2013-002895 // CNNVD: CNNVD-201306-088 // NVD: CVE-2013-3948

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-63950 // JVNDB: JVNDB-2013-002895 // NVD: CVE-2013-3948

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201306-088

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201306-088

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-002895

PATCH

title:iOS 6url:http://www.apple.com/jp/ios/

Trust: 0.8

sources: JVNDB: JVNDB-2013-002895

EXTERNAL IDS

db:NVDid:CVE-2013-3948

Trust: 2.8

db:JVNDBid:JVNDB-2013-002895

Trust: 0.8

db:CNNVDid:CNNVD-201306-088

Trust: 0.7

db:BIDid:60438

Trust: 0.4

db:VULHUBid:VHN-63950

Trust: 0.1

sources: VULHUB: VHN-63950 // BID: 60438 // JVNDB: JVNDB-2013-002895 // CNNVD: CNNVD-201306-088 // NVD: CVE-2013-3948

REFERENCES

url:http://antid0te.com/syscan_2013/syscan2013_mountain_lion_ios_vulnerabilities_garage_sale_whitepaper.pdf

Trust: 2.8

url:http://www.syscan.org/index.php/sg/program/day/2

Trust: 2.5

url:http://support.apple.com/kb/ht6162

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3948

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3948

Trust: 0.8

url:http://www.apple.com/ios/

Trust: 0.3

sources: VULHUB: VHN-63950 // BID: 60438 // JVNDB: JVNDB-2013-002895 // CNNVD: CNNVD-201306-088 // NVD: CVE-2013-3948

CREDITS

Stefan Esser

Trust: 0.3

sources: BID: 60438

SOURCES

db:VULHUBid:VHN-63950
db:BIDid:60438
db:JVNDBid:JVNDB-2013-002895
db:CNNVDid:CNNVD-201306-088
db:NVDid:CVE-2013-3948

LAST UPDATE DATE

2025-04-11T23:20:35.499000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-63950date:2014-03-16T00:00:00
db:BIDid:60438date:2013-04-26T00:00:00
db:JVNDBid:JVNDB-2013-002895date:2013-06-07T00:00:00
db:CNNVDid:CNNVD-201306-088date:2013-06-06T00:00:00
db:NVDid:CVE-2013-3948date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-63950date:2013-06-05T00:00:00
db:BIDid:60438date:2013-04-26T00:00:00
db:JVNDBid:JVNDB-2013-002895date:2013-06-07T00:00:00
db:CNNVDid:CNNVD-201306-088date:2013-06-06T00:00:00
db:NVDid:CVE-2013-3948date:2013-06-05T14:39:55.837