Apple's Safari Vulnerable To 'Cross-Site Cooking' - InformationWeek
IoT
IoT
Government // Mobile & Wireless
News
7/29/2008
02:29 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Apple's Safari Vulnerable To 'Cross-Site Cooking'

Attacks making use of this vulnerability have not yet been reported and Apple has not yet addressed the flaw.

Apple's Safari Web browser appears to be vulnerable to attack when handling cookie files in country-level top-level domains, such as .co.uk and .com.au.

The vulnerability has been filed under Common Vulnerability and Exposures identifier CVE-2008-3170 and is under review. Details about the vulnerability were first disclosed on July 12.

An attacker who successfully exploits the vulnerability could perform a session fixation attack. This allows the attacker to pre-set the victim's session ID and to use the fixed session ID for malicious activities.

An attack of this sort, known as "cross-site cooking," might include tricking a user to log in through a malicious form, exploiting a cross-site scripting vulnerability or meta tag injection flaw, breaking into host in the target server's domain, and network traffic alteration.

Attacks making use of this vulnerability have not yet been reported. Apple has not yet addressed the flaw.

Apple's Safari browser has been singled out by Microsoft and other security researchers recently for security problems.

In late May, Microsoft said was investigating reports of "a blended threat that allows remote code execution on all supported versions of Windows XP and Windows Vista when Apple's Safari Web browser has been installed."

Last week, security researcher Aviv Raff said that Apple's iPhone Mail and Safari applications are vulnerable to URL spoofing.

In a blog post earlier this month, Raff said that Apple has not learned from past browser design mistakes.

With two days left in July, Apple's Safari browser market share stands at 6.31% worldwide, according to Net Applications. That's an increase of more than 37% from its 4.58% market share in July 2007.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of the Cloud Report
As the use of public cloud becomes a given, IT leaders must navigate the transition and advocate for management tools or architectures that allow them to realize the benefits they seek. Download this report to explore the issues and how to best leverage the cloud moving forward.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll