module

Safari Archive Metadata Command Execution

Disclosed
Feb 21, 2006
Created
May 30, 2018

Description

This module exploits a vulnerability in Safari's "Safe file" feature, which will
automatically open any file with one of the allowed extensions. This can be abused
by supplying a zip file, containing a shell script, with a metafile indicating
that the file should be opened by Terminal.app. This module depends on
the 'zip' command-line utility.

Author

hdm x@hdm.io

Platform

Unix

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/osx/browser/safari_metadata_archive
msf exploit(safari_metadata_archive) > show targets
...targets...
msf exploit(safari_metadata_archive) > set TARGET < target-id >
msf exploit(safari_metadata_archive) > show options
...show and set options...
msf exploit(safari_metadata_archive) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.