Attacks/Breaches
7/22/2010
09:56 AM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Apple Safari Browser Surrenders Personal Data

A flaw in the implementation of Safari's AutoFill mechanism can be exploited to grab Mac users' names, street addresses, and e-mail addresses.

Apple's Safari Web browser will give away a user's Mac OS X Address Book data if asked by a malicious Web site.

In a blog post published on Wednesday, Jeremiah Grossman, founder and CTO of WhiteHat Security, reveals that the AutoFill functionality built into Safari 4 and 5 can be triggered remotely using a simple Web form.

AutoFill populates Web forms with frequently entered information, such as the name, address, and e-mail address of the user. Safari's AutoFill preferences menu includes the option to fill out forms "Using info from my Address Book card."

This is checked by default, allowing a malicious Web site operator to obtain the name, street address, and e-mail address listed in the Address Book of a visitor using Safari.

Proof-of-concept exploit code hosted by Robert "RSnake" Hansen, who often collaborates with Grossman on security research, shows how easy it is to obtain this information.

"[The] entire process takes mere seconds and represents a major breach in online privacy," explained Grossman. "This attack could be further leveraged in multistage attacks including e-mail spam, (spear) phishing, stalking, and even blackmail if a user is de-anonymized while visiting objectionable online material."

Grossman said in a comment on his own blog post that he believes the security flaw may reside in the open-source WebKit engine used by Safari and that the flaw may be present in older versions of Google's Chrome browser, which also relies on the WebKit engine.

The proof-of-concept exploit code did not work when tested on Chrome version 5.0.357.99 for the Mac.

Fortunately, the risk is easily mitigated: Users should uncheck the AutoFill option labelled "Using info from my Address Book card."

In the spirit of responsible disclosure, Grossman says he notified Apple about the vulnerability on June 17, 2010. He says that to date, all he has received is an automated reply, leaving him unsure whether the company is actually aware of his report.

Grossman appears not to be the first person to publish information about this privacy flaw. In April 2009, Swiss software developer Patrice Neff demonstrated that the vulnerability could be exploited to obtain a Safari user's birthday from the Mac OS X Address Book. At that time, Safari 5 had not yet been released.

The standards for responsible disclosure were questioned earlier this week by members of Google's security team. Google's security engineers argue that software companies don't move fast enough to protect their users.

For the first six months of 2010, Apple had more vulnerabilities detected in its software than Oracle, Microsoft, HP, Adobe, IBM, VMware, Cisco, Google, or Mozilla, according to a report issued recently by Secunia.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6306
Published: 2014-08-22
Unspecified vulnerability on IBM Power 7 Systems 740 before 740.70 01Ax740_121, 760 before 760.40 Ax760_078, and 770 before 770.30 01Ax770_062 allows local users to gain Service Processor privileges via unknown vectors.

CVE-2014-0232
Published: 2014-08-22
Multiple cross-site scripting (XSS) vulnerabilities in framework/common/webcommon/includes/messages.ftl in Apache OFBiz 11.04.01 before 11.04.05 and 12.04.01 before 12.04.04 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, which are not properly handled in a (1)...

CVE-2014-3525
Published: 2014-08-22
Unspecified vulnerability in Apache Traffic Server 4.2.1.1 and 5.x before 5.0.1 has unknown impact and attack vectors, possibly related to health checks.

CVE-2014-3563
Published: 2014-08-22
Multiple unspecified vulnerabilities in Salt (aka SaltStack) before 2014.1.10 allow local users to have an unspecified impact via vectors related to temporary file creation in (1) seed.py, (2) salt-ssh, or (3) salt-cloud.

CVE-2014-3594
Published: 2014-08-22
Cross-site scripting (XSS) vulnerability in the Host Aggregates interface in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-3 allows remote administrators to inject arbitrary web script or HTML via a new host aggregate name.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.