Abstract: The vulnerability is in one html file, part of the Mac OS X core, that is prone to a DOM Based XSS allowing the excution of arbitrary javascript commands in its (unrestricted) context. The mentioned file is located at /System/Library/CoreServices/HelpViewer.app/Contents/Resources/rhtmlPlayer.html and contains the following code: <script type=”text/javascript” charset=”utf-8″> setBasePathFromString(urlParam(“rhtml”)); loadLocStrings(); loadJavascriptLibs(); function init () { […]
-
Recent Posts
- JSON ContentTypeHandler
- Mac OS X vulnerability – execution of arbitrary Javascript code without restrictions
- Snort rules for Petya ransomware
- HIDDEN COBRA – DDoS Botnet Infrastructure
- Unauthenticated buffer overflow exploit
- Python – exploit script
- Bind mounts
- Autodafé
- Sulley request designed to fuzz a Web server
- General Purpose Fuzzer (GPF)
Tags
Contact
rniko@cryptolab.net
License