Apple declines to fix vulnerability in Safari's Web Archive files, likely because it requires user action to exploit

Apple declines to fix vulnerability in Safari's webarchive files, likely because it requires user action to exploit

Metasploit software developer Joe Vennix has detailed a vulnerability in Safari’s webarchive file format along with how it can be exploited. The post on Rapid7 says that after being reported to Apple back in February, the bug was closed last month with a status of “wontfix”, indicating that Apple has no plans to address the bug. So what is it and why is that?

In Safari, if you go to save a web page, one of the options for the format to use is Web Archive. In many browsers when you save a web page locally, it only consists of the HTML source code itself. This means that any images, embedded videos, linked stylesheets or JavaScript will be lost. When you open a copy of the locally saved page, it will be missing all of the additional content, often not showing much more than text from the page and broken images. Safari’s Web Archive format works by not only saving the HTML of the page, but any linked content. When you open a Web Archive file, you will see the page as it would have originally appeared on the Internet, with all images, styling, and linked content preserved.

The bug found in Safari’s security model is a lack of restriction on what data can be accessed by files in a web archive. Normally a page like apple.com would be restricted to reading cookies that belonged to only the apple.com domain. It could not read cookies from another domain, such as gmail.com. This is critical because if all of your cookies were readable by any website, it would be trivial for a malicious site to send your cookies back to an attacker, who could then log in to your accounts on any number of websites. In the case of Safari’s web archives, it’s possible for a malicious web archive to not only access content stored by another site, but potentially any file on the victim’s computer.

With such a serious sounding vulnerability, you might be wondering why Apple wouldn’t want to fix it. The answer seems to be that an exploit like this cannot be accomplished without user action. You couldn’t actually be affected by this unless you were to download and open a malicious .webarchive file. Users can avoid being attacked by employing the age old advice of not opening strange files from the Internet (or anywhere else for that matter). That said, some people still do and surely will continue to do so. Given the potential impact of a vulnerability like this on users, it certainly seems like something Apple would want to fix at some point.

If you’re interesting in understanding more about how this bug works or can be exploited, Joe’s blog post covers several real world examples of how it could be used.

Source: Rapid7

Nick Arnott

Security editor, breaker of things, and caffeine savant. QA at Double Encore. Writes on neglectedpotential.com about QA & security, and as @noir on Twitter about nothing in particular.

More Posts

 

8
loading...
5
loading...
75
loading...
0
loading...

← Previously

What do you want to see in iMore app 3.0?

Next up →

Editor's desk: #TM13

Reader comments

Apple declines to fix vulnerability in Safari's Web Archive files, likely because it requires user action to exploit

2 Comments
Sort by Rating

Other concerns aside for the moment, is the version of webarchive used in iTunes LP and extras vulnerable? If so, this seems like a mistake to leave open, as most people do not know the format is in use there, nor does it seem wise to for Apple to trust only pre-store inclusion scanning.