Printer Pro 5.4.3 IOS - Persistent Cross-Site Scripting








Document Title:
Printer Pro 5.4.3 IOS  - Cross Site Scripting 

Credits & Authors:
TaurusOmar  - @TaurusOmar_ ( []

Release Date:

Product & Service Introduction:
Print attachments, documents, web pages and more right from your iPhone and iPad to any Wi-Fi or USB printer.
Printer Pro lets you wirelessly print from the iPhone or iPad. It can print directly to many Wi-Fi printers or any
printer attached to your Mac or PC via helper application installed on your computer.
Once installed, Printer Pro appears in the "Open In..." list on your device. This lets you print documents from Mail,
PDF Expert and many other applications on your iPhone or iPad that support this function.

(Copy of the Vendor Homepage:

Abstract Advisory Information:
An independent Vulnerability Laboratory researcher discovered multiple vulnerabilities in the official aplication  Printer Pro 5.4.3.

Vulnerability Disclosure Timeline:
2015-08-11:	Public Disclosure 

Discovery Status:

Affected Product(s):
Product: Printer Pro 5.4.3 - iOS Mobile Application

Exploitation Technique:

Severity Level:

Technical Details & Description:
An application-side input validation  vulnerability has been discovered in the officialPrinter Pro 5.4.3 iOS mobile application.
The vulnerability allows a local attacker to inject own script code as payload to the application-side of the vulnerable service function or module.
The vulnerability exists in the TextBox Name contacts in which injects the code is activated When the application is opened and the contact containing 
the script selects to print
Request Method(s):
					[+] Import
Vulnerable Module(s):
					[+] Add Contact

Vulnerable Parameter(s):
					[+] TextBox Name

Vulnerable Final(s):
					[+] Print Contact 					

Proof of Concept (PoC):
The persistent input validation web vulnerability can be exploited by local attackers with system user account and without .
For security demonstration or to reproduce the security vulnerability follow the provided information and steps below to continue.

1. Install the ios application (
2. Add new Contact with script in the TexBox Name 
2. Start the app and open the import function
3. Select contact that contains the script
4. Successful reproduce of the persistent vulnerability!

Proof of Concept (IMAGES):


PoC: Cross Site Scripting
<object data="data:text/html;base64,PHNjcmlwdD5hbGVydCgiVnVsbmVyYWJsZSIpOzwvc2NyaXB0Pg=="></object>

Security Risk:
The security risk of the persistent input validation vulnerability in the name value is estimated as medium. (CVSS 3.7)