Mac OS X Help URI Handler Arbitrary Script Execution
lixlpixel has reported a vulnerability in Mac OS X, potentially allowing malicious web sites to compromise a vulnerable system.
The problem is that the “help” URI handler allows execution of arbitrary local scripts (.scpt) via the classic directory traversal character sequence using “help:runscript”.
It is reportedly possible to place arbitrary files in a known location, including script files, on a user’s system if the Safari browser has been configured to (“Open “safe” files after download”) (default behaviour) by asking a user to download a “.dmg” (disk image) file.
This has been confirmed on Macintosh OS X using Safari 1.2.1 (v125.1) and Internet Explorer 5.2.
Uncheck (“Open “safe” files after download”) in “Safari -> Preferences -> General”.
Do not surf the Internet as a privileged user.
Rename the help URI handler.
Provided and/or discovered by: lixlpixel
Proof of Concept: copy/paste “help://cat /etc/passwd” in the address bar
This is a harmless POC that will launch the help and dump the passwd file.
Post a reply
You must be logged in to post a comment.