Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 27 Mar 2020 01:10:36 +0400
From: Dhiraj Mishra <>
Subject: Stealing Videos from VLC-iOS (IDOR)

Summary: VLC for iOS was vulnerable to an unauthenticated insecure direct
object reference (IDOR) which could allow a local attacker to steal media
from the storage by just navigating to the source URL/IP. This was possible
by abusing a functionality in the iOS application for VLC, which allows a
user to share files with others over WiFi. This can be simply done by
enabling "Network > Sharing via WiFi" and the web-server for this
functionality works on port 80(http) protocol.

Attack Vector: Let's assume a scenario where Bob & Alice are sharing a
video over the WiFi using vlc-iOS, Eve could perform this attack by
crawling the source IP address of Bob which would list the URL's of the
videos shared between Bob & Alice. Having said that, navigating to those
URL's Eve could simply steal the video without Bob's knowledge which
successfully leads to unauthenticated IDOR. Such things can be crawled via
burpsuite or you can use python scrapy to extract the URL's from the host
and download the videos.

Mitigation from VLC Security team: They implemented a user-friendly
authentication mechanism on VLC iOS web server for WiFi Sharing. Passcode
authentication is enabled when VLC's passcode setting is enabled and the
user uses the passcode that he set in VLC's settings to log into Wifi
Sharing. This was reported on 2nd Jan 2019 and patched on 10th Feb 2020
whereas fixed version was publicly released in March 2020. Post mitigation
VLC published an advisory for this which you can view here[1].

Blog URL:

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.