Tag Archive for: hole

Unpatched macOS Security Hole Allows for Remote Code Execution


Another day, another vulnerability. This time it affects macOS Big Sur as well as earlier versions of macOS. More concerning, the security hole remains unpatched, according to a report at Ars Technica. The security vulnerability is a significant one allowing for code execution by a remote attacker.

Independent security researcher Park Minchan discovered the security flaw, which allows hackers to embed commands into shortcut files with the inetloc extension.

These inetloc files are internet shortcut files that often contain typically innocuous server details and connection information. Users open these files expecting them to open a website, for example. They are not expecting the file to execute some random code.

The vulnerability exploits how macOS reads the content of inetloc files. Instead of using HTTPS:// for a web browser, hackers can substitute file:// and execute a file on the user’s computer.

Apple was aware of this flaw and blocked the addition of the file:// prefix in these internet shortcut files. Apple thought it had the bases covered, but the Cupertino giant forgot about case sensitivity.

Minchan discovered that while macOS blocked file://, it did not stop the capitalized version File://. 

Ars tested this vulnerability and launched the calculator app from an inetloc file containing eight lines of code. Launching the calculator app is benign. Unfortunately, the flaw is much more permissive. A skilled hacker could easily open system folders and other folders that contain malicious code downloaded to the user’s machine.

Minchan reported the flaw to Apple using the company’s SSD Secure Disclosure program. Apple has not publicly commented on the vulnerability, but we would expect the company to issue a security patch in the future.

macOS users should be cautious when opening internet shortcut files, especially those sent via unsolicited emails. They also should apply updates as soon as they are released. 

Source…

Firefox for Android gets critical update to block cookie-stealing hole – Naked Security


Usually, when browser updates come out, it’s obvious what to do if you’re running that browser on your laptop or desktop computer.

But we often get questions from readers (questions that we can’t always answer) wondering what to do if they’re using that browser on their mobile phone, where version numbering is often bewildering.

In the case of Firefox’s latest update we can at least partly answer that question for Android users, because the latest 88.0.1 “point release” of Mozilla’s browser lists only one security patch dubbed critical, namely CVE-2021-29953:

This issue only affected Firefox for Android. Other operating systems are unaffected. Further details are being temporarily withheld to allow users an opportunity to update.

The bug listed here is what’s known as a Universal Cross-site Scripting (UXSS) vulnerability, which means it’s a way for attackers to access private browser data from website X while you are browsing on booby-trapped website Y.

That’s definitely not supposed to happen.

Your browser is supposed to stop data such as cookies “leaking” between websites, or else site Y could peek at data such as your login details for site X, and abuse that site-specific data to masquerade as you on site X and hijack your account.

Browsers are supposed to enforce the aptly-named Same Origin Policy, or SOP, whereby locally-saved web data is locked down so it can only be read back in later on by the same website that saved it in the first place.

This helps to maintain security and privacy by preventing websites from leeching information about each other’s users.