exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

apple_webkit_filedisclosure.txt

apple_webkit_filedisclosure.txt
Posted Apr 24, 2005
Authored by David Remahl | Site remahl.se

AppleWebKit XMLHttpRequest arbitrary file disclosure - Apple Safari 1.2+, Apple RSS 2.0 pre-release, OmniGroup OmniWeb 5.1+, as well as other software based on a common engine, are vulnerable to malicious webservers attacking them and retrieving information (arbitrary files on disk).

tags | advisory, arbitrary
systems | apple
SHA-256 | 0ea575297839fdac0e3654c2488db5abe193e71540f91deb28ffc4cd0bd4c886

apple_webkit_filedisclosure.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

The full, up-to-date, text of this advisory is located at:
<http://remahl.se/david/vuln/001/>.

Title: AppleWebKit XMLHttpRequest arbitrary file disclosure
vulnerability
Date of discovery: 2005-02-13
Date of publication: 2005-04-16
Discovered by: David Remahl (david@remahl.se)
Impact: arbitrary file disclosure, origin validation error
CVE: CAN-2005-0976

AFFECTED PRODUCTS

Verified vulnerable
Apple Safari 1.2+
Apple Safari RSS 2.0, pre-release
OmniGroup OmniWeb 5.1+
Shiira 0.93 does not support automatic disk image mounting but is
vulnerable to other ways of predicting file paths.
Other applications that use recent versions of WebCore/WebKit and
allow JavaScript and the file: protocol

Possibly / partially vulnerable
Other applications that utilize KHTML

Verified not vulnerable
Mozilla Firefox 1.0
Konqueror 3.3 [prevents the redirection to the local file but
allows local files the same access to XMLHttpRequest as Safari and
OmniWeb
Don't support XMLHttpRequest:
Apple Safari <1.2
OmniGroup OmniWeb 5.0.x
Freeverse BumperCar 1.0

INTRODUCTION

XMLHttpRequest is a JavaScript component that allows scripts to perform
http queries and read their result.

The attack described herein requires that the attacker has the ability
to place an HTML file on the victim's system and predict its path. By
exploiting AppleWebKit's special treatment of XMLHttpRequest when
running from a file: document, the attacker can gain read access to
any file on the system with a known path that the user running the
browser has access to.

The automatic mounting of disk images performed by default by Safari
and OmniWeb provides the attacker with an easy way to get the local
file onto the user's system. Other approaches exist, such as
predicting the path to the user's download directory, using an afp://
or ftp:// URL to mount a remote unit and access it using
file:///Volumes/resource/.

IMPACT

This vulnerability allows a remote attacker to read files with known
path names on a user's system. The vulnerability also allows the
attacker to bypass the restriction that XMLHttpRequests may only be
made to the server hosting the original document.

There is a potential for other types of disclosure due to the
attacker's opportunity to run any code from a local file.

The impact of this vulnerability is diminished but not eliminated if
the automatic mounting of disk images and remote volumes is disabled.

DEMONSTRATION

A benign demonstration of the vulnerability is provided at the
following URL:

http://remahl.se/david/vuln/001/demo.html

The demonstration downloads and mounts a disk image when a link is
clicked. It then redirects an iframe to the predicted path of the
exploit document. The document is also available over http for
completeness. A real attacker would be able to make the attack a lot
more stealthy.

Alternative possibilities of getting a file with a know path onto the
victim's system are discussed on the in-depth discussion page.

VENDOR RESPONSE

OmniGroup
2005-02-13, 19:34 UTC: Working on a fix.
According to CERT (2005-03-17), OmniGroup plans to release a fix
around mid-April.

Apple Computer
2005-02-14, 06:25 UTC: Responded that investigation is under-way.
Does not disclose, discuss or confirm issues until a full
investigation has been completed and patches are available.
2005-03-16, 22:04 UTC: Reported that the issue would be fixed in a
future security update.
2005-03-17: Confirmed that the issue would be fixed in the May
security update (2005-005).
2005-04-15, 00:41 UTC: Reported that the issue is addressed in the
10.3.9 update that was due to be released in two hours.

SOLUTION

For Safari, update to 10.3.9 using software update. See
<http://docs.info.apple.com/article.html?artnum=300966> and
<http://docs.info.apple.com/article.html?artnum=301327> for more
information.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (Darwin)

iD8DBQFCYK2tFlFiDoclYIURAv6AAJ4zLpIgrhFiFbNhtkOaiH9ymZlbvwCeOZ48
5SgrLN/0DSMcPxLsRvebdXY=
=pSXC
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close