Unauthenticated File Overwrite Vulnerability in Metaclassy Byword App 2.x for iOS
CVE-2013-5725 · MEDIUM Severity
AV:N/AC:L/AU:N/C:N/I:P/A:N
The Metaclassy Byword app 2.x before 2.1 for iOS does not require confirmation of Replace file actions, which allows remote attackers to overwrite arbitrary files via the name and text parameters in a byword://replace URL.
Learn more about our Cis Benchmark Audit For Apple Ios.