Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-8389 PoC — Musicloud 信息泄露漏洞

Source
Associated Vulnerability
Title:Musicloud 信息泄露漏洞 (CVE-2019-8389)
Description:Musicloud是一款在线音乐播放器。 Musicloud 1.6版本中的Wi-Fi传输功能存在信息泄露漏洞,该漏洞源于在默认情况下,同一网络上的任意用户都可以访问运行在8080端口的传输服务。攻击者可利用该漏洞访问任意被请求文件的内容(例如:/etc/passwd文件)。
Description
 [CVE-2019-8389] An exploit code for exploiting a local file read vulnerability in Musicloud v1.6 iOS Application 
Readme
# CVE-2019-8389 - Arbitrary file read in Musicloud for iOS v1.6
 [CVE-2019-8389] An exploit code for exploiting a local file read vulnerability in Musicloud v1.6 iOS Application 

### Description:
A file-read vulnerability was identified in the Wi-Fi transfer feature of Musicloud 1.6. By default, the application runs a transfer service on port 8080, accessible by everyone on the same Wi-Fi network. An attacker can send the POST parameters downfiles and cur-folder (with a crafted ../ payload) to the download.script endpoint. This will create a MusicPlayerArchive.zip archive that is publicly accessible and includes the content of any requested file (such as the /etc/passwd file).

## Information:
Affected Application: Musicloud for iOS

Version Affected: v1.6

Discovered by : Shawar Khan from Hackersray

## Proof of Concept:
[![asciicast](https://asciinema.org/a/228052.svg)](https://asciinema.org/a/228052)


[![CVE-2019-8389 Proof of Concept ](https://img.youtube.com/vi/NWLKaXwW_PU/0.jpg)](https://www.youtube.com/watch?v=NWLKaXwW_PU)
File Snapshot

[4.0K] /data/pocs/637590206a1a75818b317f692c4e59945e205779 ├── [1.7K] CVE-2019-8389.py └── [1.0K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.