Remote Exploit for MacOSX
[Via Jay Allen] This is the sort of thing one expects from our friends in Redmond.
- Help Viewer.app will happily run scripts on your local machine.
- Help Viewer.app is the default helper application for
help://...
URI’s. - Ergo an evil web master can execute scripts on your computer by redirecting an (innocent-looking) link that you click on to a
help:runscript=/path/to/some/script.scpt
URL.
By itself, this is limited to executing scripts or applications that are already on your machine (this includes the ubiquitous OpnApp.scpt
, which can execute shell commands). For extra fun, Mr. Evil can get you to remote-mount a disk image by redirecting you to a disk://...
URL, and then use the previous trick to run an application on the mounted disk image.
That is really, really, evil.
Workaround: Use the RCDefaultApp PreferencePane to disable the help://...
helper application. And, similarly, disable disk://...
and disks://...
.
Update (5/21/2004): Apple has released an update to Help Viewer.app to address this issue, Security Update 2004-05-24 (also available through Software Update):
HelpViewer: Fixes CAN-2004-0486 to ensure that HelpViewer will only process scripts that it initiated. Credit to lixlpixel <me@lixlpixel.com> for reporting this issue.
Update (5/22/2004): John Gruber points out another vulnerability, this time in Terminal.app’s handling of the telnet://
URI scheme. Following a
telnet://-npath%2Fto%2Fsome%2Ffile
will overwrite any file you have write-access to. Best to disable that URI scheme too, until Apple fixes Terminal.app. (It’s fixed in 10.3.4.).
Posted by distler at May 19, 2004 1:56 AM
Re: Remote Exploit for MacOSX
As in the OpenBSD motto: “Only one remote hole in the default install, in more than 8 years!”