{"vuid":"VU#998369","idnumber":"998369","name":"Apple Web Kit-based browsers may allow remote access to local filesystem contents","keywords":["apple","XMLHttpRequest","os x","safari","omniweb","local filesystem access"],"overview":"Web browsers based on AppleWebKit may allow remote web sites to reference content on the local filesystem. This may allow an attacker to execute script within the security context of the local machine.","clean_desc":"Web browsers that allow remote web sites to reference content that resides on the local filesystem may be vulnerable to cross-domain security violations. In a typical attack scenario, an attacker must first place content in a known or predictable location on a computer. If a web browser allows a remote web site to reference that content, this may allow attacker-supplied script to run within the security context of the local machine. Web browsers based on AppleWebKit, such as Safari, fail to restrict web sites from accessing content on the local filesystem. OmniWeb, which is based on Apple WebCore, also contains the same vulnerability. Current proof-of-concept exploit code uses the XMLHttpRequest object to read files from the local filesystem.","impact":"A remote, unauthenticated attacker may be able to execute script within the security context of the local machine. Script that executes within this context may be able to perform privileged actions, such as reading files from the local filesystem. These actions would not be possible by using script that executes within the security context of the remote web site.","resolution":"Upgrade or patch\nPlease see the Systems Affected section of this document for update availability.","workarounds":"Workarounds Users who are unable to upgrade to a fixed version of the software are encouraged to disable JavaScript in their browsers.","sysaffected":"","thanks":"Thanks to David Remahl for reporting this vulnerability.","author":"This document was written by Will Dormann.","public":["http://remahl.se/david/vuln/001/","http://docs.info.apple.com/article.html?artnum=301327","http://www.osvdb.org/15637","http://xforce.iss.net/xforce/xfdb/20124","http://secunia.com/advisories/14974","http://www.securityfocus.com/bid/13202","http://packetstormsecurity.org/0504-advisories/apple_webkit_filedisclosure.txt","http://www.omnigroup.com/applications/omniweb/releasenotes/"],"cveids":["CVE-2005-0976"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-02-15T15:36:01Z","publicdate":"2005-04-16T00:00:00Z","datefirstpublished":"2005-07-06T18:39:29Z","dateupdated":"2005-07-06T18:39:51Z","revision":13,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"10","cam_impact":"5","cam_easeofexploitation":"12","cam_attackeraccessrequired":"17","cam_scorecurrent":"4.78125","cam_scorecurrentwidelyknown":"5.7375","cam_scorecurrentwidelyknownexploited":"9.5625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":4.78125,"vulnote":null}