Apple Safari Password Manager Cross-Site Information Disclosure Weakness

BID:21329

Info

Apple Safari Password Manager Cross-Site Information Disclosure Weakness

Bugtraq ID: 21329
Class: Origin Validation Error
CVE:
Remote: Yes
Local: No
Published: Nov 28 2006 12:00AM
Updated: Nov 29 2006 10:00PM
Credit: David Teare disclosed this weakness in Apple Safari.
Vulnerable: Apple Safari 2.0.4
Not Vulnerable:

Discussion

Apple Safari Password Manager Cross-Site Information Disclosure Weakness

Apple Safari is prone to an information-disclosure weakness because it fails to properly notify users of the automatic population of form fields in disparate URLs deriving from the same domain.

This issue may allow attackers to obtain user credentials that have been saved in forms deriving from the same website where attack code resides. The most common manifestation of this condition would typically be in blogs or forums. This may allow attackers to gain access to potentially sensitive information that would facilitate the success of phishing attacks.

Exploit / POC

Apple Safari Password Manager Cross-Site Information Disclosure Weakness

Attackers use standard HTML design utilities and webserver applications to exploit this issue.

A proof of concept by David Teare is available at the following location where a browser can be tested for this weakness.

Proof of Concept: http://tearesolutions.com/rcsr-step1.html

Solution / Fix

Apple Safari Password Manager Cross-Site Information Disclosure Weakness

Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected]:[email protected].

References

Apple Safari Password Manager Cross-Site Information Disclosure Weakness

References:
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report