Remote Exploit for MacOSX
[Via Jay Allen] This is the sort of thing one expects from our friends in Redmond.
- Help Viewer.app will happily run scripts on your local machine.
- Help Viewer.app is the default helper application for
help://...URI’s. - Ergo an evil web master can execute scripts on your computer by redirecting an (innocent-looking) link that you click on to a
help:runscript=/path/to/some/script.scptURL.
By itself, this is limited to executing scripts or applications that are already on your machine (this includes the ubiquitous OpnApp.scpt, which can execute shell commands). For extra fun, Mr. Evil can get you to remote-mount a disk image by redirecting you to a disk://... URL, and then use the previous trick to run an application on the mounted disk image.
That is really, really, evil.
Workaround: Use the RCDefaultApp PreferencePane to disable the help://... helper application. And, similarly, disable disk://... and disks://... .
Update (5/21/2004): Apple has released an update to Help Viewer.app to address this issue, Security Update 2004-05-24 (also available through Software Update):
HelpViewer: Fixes CAN-2004-0486 to ensure that HelpViewer will only process scripts that it initiated. Credit to lixlpixel <me@lixlpixel.com> for reporting this issue.
Update (5/22/2004): John Gruber points out another vulnerability, this time in Terminal.app’s handling of the telnet:// URI scheme. Following a
telnet://-npath%2Fto%2Fsome%2Ffile
will overwrite any file you have write-access to. Best to disable that URI scheme too, until Apple fixes Terminal.app. (It’s fixed in 10.3.4.).
Posted by distler at May 19, 2004 1:56 AM
Re: Remote Exploit for MacOSX
As in the OpenBSD motto: “Only one remote hole in the default install, in more than 8 years!”