module
Apple Safari file:// Arbitrary Code Execution
Disclosed | Created |
---|---|
2011-10-12 | 2018-05-30 |
Disclosed
2011-10-12
Created
2018-05-30
Description
This module exploits a vulnerability found in Apple Safari on OS X platform.
A policy issue in the handling of file:// URLs may allow arbitrary remote code
execution under the context of the user.
In order to trigger arbitrary remote code execution, the best way seems to
be opening a share on the victim machine first (this can be SMB/WebDav/FTP, or
a file format that OS X might automount), and then execute it in /Volumes/[share].
If there's some kind of bug that leaks the victim machine's current username,
then it's also possible to execute the payload in /Users/[username]/Downloads/,
or else bruteforce your way to getting that information.
Please note that non-java payloads (*.sh extension) might get launched by
Xcode instead of executing it, in that case please try the Java ones instead.
A policy issue in the handling of file:// URLs may allow arbitrary remote code
execution under the context of the user.
In order to trigger arbitrary remote code execution, the best way seems to
be opening a share on the victim machine first (this can be SMB/WebDav/FTP, or
a file format that OS X might automount), and then execute it in /Volumes/[share].
If there's some kind of bug that leaks the victim machine's current username,
then it's also possible to execute the payload in /Users/[username]/Downloads/,
or else bruteforce your way to getting that information.
Please note that non-java payloads (*.sh extension) might get launched by
Xcode instead of executing it, in that case please try the Java ones instead.
Authors
Aaron Sigel
sinn3r sinn3r@metasploit.com
sinn3r sinn3r@metasploit.com
Platform
Java,OSX,Unix
Architectures
cmd, java
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.