The Twitter subsystem in Apple iOS before 7 does not require API conformity for access to Twitter daemon interfaces, which allows attackers to post Tweets via a crafted app that sends direct requests to the daemon.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.securitytracker.com/id/1029054 | vdb entry |
http://secunia.com/advisories/54886 | third party advisory vendor advisory |
http://support.apple.com/kb/HT5934 | vendor advisory |
http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html | vendor advisory |