Vulnerabilities > CVE-2006-0848 - Configuration vulnerability in Apple mac OS X and mac OS X Server
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
The "Open 'safe' files after downloading" option in Safari on Apple Mac OS X allows remote user-assisted attackers to execute arbitrary commands by tricking a user into downloading a __MACOSX folder that contains metadata (resource fork) that invokes the Terminal, which automatically interprets the script using bash, as demonstrated using a ZIP file that contains a script with a safe file extension.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 2 |
Common Weakness Enumeration (CWE)
Exploit-Db
description | Safari Archive Metadata Command Execution. CVE-2006-0848. Remote exploit for unix platform |
id | EDB-ID:16866 |
last seen | 2016-02-02 |
modified | 2010-09-20 |
published | 2010-09-20 |
reporter | metasploit |
source | https://www.exploit-db.com/download/16866/ |
title | Safari Archive Metadata Command Execution |
Metasploit
description | This module exploits a vulnerability in Safari's "Safe file" feature, which will automatically open any file with one of the allowed extensions. This can be abused by supplying a zip file, containing a shell script, with a metafile indicating that the file should be opened by Terminal.app. This module depends on the 'zip' command-line utility. |
id | MSF:EXPLOIT/OSX/BROWSER/SAFARI_METADATA_ARCHIVE |
last seen | 2020-06-13 |
modified | 2017-07-24 |
published | 2009-07-16 |
references | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0848 |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/osx/browser/safari_metadata_archive.rb |
title | Safari Archive Metadata Command Execution |
Nessus
NASL family | MacOS X Local Security Checks |
NASL id | MACOSX_SECUPD2006-001.NASL |
description | The remote host is running Apple Mac OS X, but lacks Security Update 2006-001. This security update contains fixes for the following applications : apache_mod_php automount Bom Directory Services iChat IPSec LaunchServices LibSystem loginwindow Mail rsync Safari Syndication |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 20990 |
published | 2006-03-02 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/20990 |
title | Mac OS X Multiple Vulnerabilities (Security Update 2006-001) |
code |
|
Packetstorm
data source | https://packetstormsecurity.com/files/download/82306/safari_metadata_archive.rb.txt |
id | PACKETSTORM:82306 |
last seen | 2016-12-05 |
published | 2009-10-28 |
reporter | H D Moore |
source | https://packetstormsecurity.com/files/82306/Safari-Archive-Metadata-Command-Execution.html |
title | Safari Archive Metadata Command Execution |
Saint
bid | 16736 |
description | Safari archive metadata command execution |
osvdb | 23366 |
title | safari_safe_file_explicit_bind |
type | client |
References
- http://docs.info.apple.com/article.html?artnum=303382
- http://docs.info.apple.com/article.html?artnum=303382
- http://secunia.com/advisories/18963
- http://secunia.com/advisories/18963
- http://securitytracker.com/id?1015652
- http://securitytracker.com/id?1015652
- http://www.frsirt.com/exploits/20060222.safari_safefiles_exec.pm.php
- http://www.frsirt.com/exploits/20060222.safari_safefiles_exec.pm.php
- http://www.heise.de/english/newsticker/news/69862
- http://www.heise.de/english/newsticker/news/69862
- http://www.kb.cert.org/vuls/id/999708
- http://www.kb.cert.org/vuls/id/999708
- http://www.mathematik.uni-ulm.de/numerik/staff/lehn/macosx.html
- http://www.mathematik.uni-ulm.de/numerik/staff/lehn/macosx.html
- http://www.osvdb.org/23510
- http://www.osvdb.org/23510
- http://www.securityfocus.com/bid/16736
- http://www.securityfocus.com/bid/16736
- http://www.us-cert.gov/cas/techalerts/TA06-053A.html
- http://www.us-cert.gov/cas/techalerts/TA06-053A.html
- http://www.us-cert.gov/cas/techalerts/TA06-062A.html
- http://www.us-cert.gov/cas/techalerts/TA06-062A.html
- http://www.vupen.com/english/advisories/2006/0671
- http://www.vupen.com/english/advisories/2006/0671
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24808
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24808