Unauthenticated File Overwrite Vulnerability in Metaclassy Byword App 2.x for iOS

Unauthenticated File Overwrite Vulnerability in Metaclassy Byword App 2.x for iOS

CVE-2013-5725 · MEDIUM Severity

AV:N/AC:L/AU:N/C:N/I:P/A:N

The Metaclassy Byword app 2.x before 2.1 for iOS does not require confirmation of Replace file actions, which allows remote attackers to overwrite arbitrary files via the name and text parameters in a byword://replace URL.

Learn more about our Cis Benchmark Audit For Apple Ios.