CVE-2006-0848

Safari - Command Injection

Title source: llm

Description

The "Open 'safe' files after downloading" option in Safari on Apple Mac OS X allows remote user-assisted attackers to execute arbitrary commands by tricking a user into downloading a __MACOSX folder that contains metadata (resource fork) that invokes the Terminal, which automatically interprets the script using bash, as demonstrated using a ZIP file that contains a script with a safe file extension.

Exploits (2)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremoteunix
https://www.exploit-db.com/exploits/16866
metasploit WORKING POC EXCELLENT
by hdm · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/osx/browser/safari_metadata_archive.rb

Scores

EPSS 0.7880
EPSS Percentile 99.1%

Details

CWE
CWE-16
Status published
Products (2)
apple/mac_os_x 10.4.5
apple/mac_os_x_server 10.4.5
Published Feb 22, 2006
Tracked Since Feb 18, 2026