Attacks/Breaches
7/22/2010
09:56 AM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Apple Safari Browser Surrenders Personal Data

A flaw in the implementation of Safari's AutoFill mechanism can be exploited to grab Mac users' names, street addresses, and e-mail addresses.

Apple's Safari Web browser will give away a user's Mac OS X Address Book data if asked by a malicious Web site.

In a blog post published on Wednesday, Jeremiah Grossman, founder and CTO of WhiteHat Security, reveals that the AutoFill functionality built into Safari 4 and 5 can be triggered remotely using a simple Web form.

AutoFill populates Web forms with frequently entered information, such as the name, address, and e-mail address of the user. Safari's AutoFill preferences menu includes the option to fill out forms "Using info from my Address Book card."

This is checked by default, allowing a malicious Web site operator to obtain the name, street address, and e-mail address listed in the Address Book of a visitor using Safari.

Proof-of-concept exploit code hosted by Robert "RSnake" Hansen, who often collaborates with Grossman on security research, shows how easy it is to obtain this information.

"[The] entire process takes mere seconds and represents a major breach in online privacy," explained Grossman. "This attack could be further leveraged in multistage attacks including e-mail spam, (spear) phishing, stalking, and even blackmail if a user is de-anonymized while visiting objectionable online material."

Grossman said in a comment on his own blog post that he believes the security flaw may reside in the open-source WebKit engine used by Safari and that the flaw may be present in older versions of Google's Chrome browser, which also relies on the WebKit engine.

The proof-of-concept exploit code did not work when tested on Chrome version 5.0.357.99 for the Mac.

Fortunately, the risk is easily mitigated: Users should uncheck the AutoFill option labelled "Using info from my Address Book card."

In the spirit of responsible disclosure, Grossman says he notified Apple about the vulnerability on June 17, 2010. He says that to date, all he has received is an automated reply, leaving him unsure whether the company is actually aware of his report.

Grossman appears not to be the first person to publish information about this privacy flaw. In April 2009, Swiss software developer Patrice Neff demonstrated that the vulnerability could be exploited to obtain a Safari user's birthday from the Mac OS X Address Book. At that time, Safari 5 had not yet been released.

The standards for responsible disclosure were questioned earlier this week by members of Google's security team. Google's security engineers argue that software companies don't move fast enough to protect their users.

For the first six months of 2010, Apple had more vulnerabilities detected in its software than Oracle, Microsoft, HP, Adobe, IBM, VMware, Cisco, Google, or Mozilla, according to a report issued recently by Secunia.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4262
Published: 2014-07-28
svnwcsub.py in Subversion 1.8.0 before 1.8.3, when using the --pidfile option and running in foreground mode, allows local users to gain privileges via a symlink attack on the pid file. NOTE: this issue was SPLIT due to different affected versions (ADT3). The irkerbridge.py issue is covered by CVE-...

CVE-2013-4840
Published: 2014-07-28
Unspecified vulnerability in HP and H3C VPN Firewall Module products SECPATH1000FE before 5.20.R3177 and SECBLADEFW before 5.20.R3177 allows remote attackers to cause a denial of service via unknown vectors.

CVE-2013-7393
Published: 2014-07-28
The daemonize.py module in Subversion 1.8.0 before 1.8.2 allows local users to gain privileges via a symlink attack on the pid file created for (1) svnwcsub.py or (2) irkerbridge.py when the --pidfile option is used. NOTE: this issue was SPLIT from CVE-2013-4262 based on different affected versions...

CVE-2014-2974
Published: 2014-07-28
Cross-site request forgery (CSRF) vulnerability in php/user_account.php in Silver Peak VX through 6.2.4 allows remote attackers to hijack the authentication of administrators for requests that create administrative accounts.

CVE-2014-2975
Published: 2014-07-28
Cross-site scripting (XSS) vulnerability in php/user_account.php in Silver Peak VX before 6.2.4 allows remote attackers to inject arbitrary web script or HTML via the user_id parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.