Monday, April 29, 2013

Apple declines to fix vulnerability in Safari's Web Archive files, likely because it requires user action to exploit

Apple declines to fix vulnerability in Safari's webarchive files, likely because it requires user action to exploit

Metasploit software developer Joe Vennix has detailed a vulnerability in Safari?s webarchive file format along with how it can be exploited. The post on Rapid7 indicates that after being reported to Apple back in February, the bug was closed last month with a status of ?wontfix?, indicating that Apple has no plans to address the bug. So what is it and why is that?

In Safari, if you go to save a web page, one of the options for the format to use is Web Archive. In many browsers when you save a web page locally, it only consists of the HTML source code itself. This means that any images, embedded videos, linked stylesheets or JavaScript will be lost. When you open a copy of the locally saved page, it will be missing all of the additional content, often not showing much more than text from the page and broken images. Safari?s Web Archive format works by not only saving the HTML of the page, but any linked content. When you open a Web Archive file, you will see the page as it would have originally appeared on the Internet, with all images, styling, and linked content preserved.

The bug found in Safari?s security model is a lack of restriction on what data can be accessed by the files in the web archive. Normally a page like Apple.com would be restricted to reading cookies that belonged to only the apple.com domain. It could not read cookies from another domain, such as Gmail.com. This is critical because if all of your cookies were readable by any website, it would be trivial for a malicious site to send your cookies back to an attacker, who could then log in to your accounts on any number of websites. In the case of Safari?s web archives, it?s possible for a malicious web archive to not only access content storied by another site, but potentially any file on the victim?s computer.

With such a serious sounding vulnerability, you might be wondering why Apple wouldn?t want to fix it? The answer seems to be that an exploit like this cannot be accomplished without user action. You couldn?t actually be affected by this unless you were to download and open a malicious .webarchive file. Users can avoid being attacked by employing the age old advice of not opening strange files from the Internet (or anywhere for that matter). That said, some people still do and surely will continue to do so. Given the potential impact of a vulnerability like this on users, it certainly seems like something Apple would want to fix at some point.

If you?re interesting in understanding more about how this bug works or can be exploited, Joe?s blog post covers several real world examples of how it could be used.

Source: Rapid 7

    


Source: http://feedproxy.google.com/~r/TheIphoneBlog/~3/Pe35DEfi3F4/story01.htm

bloom energy franklin graham jambalaya taylor swift and zac efron basketball wives manny ramirez easter 2012

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.