CVE-2006-0848
Safari - Command Injection
Title source: llmDescription
The "Open 'safe' files after downloading" option in Safari on Apple Mac OS X allows remote user-assisted attackers to execute arbitrary commands by tricking a user into downloading a __MACOSX folder that contains metadata (resource fork) that invokes the Terminal, which automatically interprets the script using bash, as demonstrated using a ZIP file that contains a script with a safe file extension.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremoteunix
https://www.exploit-db.com/exploits/16866
metasploit
WORKING POC
EXCELLENT
by hdm · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/osx/browser/safari_metadata_archive.rb
References (13)
Scores
EPSS
0.7880
EPSS Percentile
99.1%
Details
CWE
CWE-16
Status
published
Products (2)
apple/mac_os_x
10.4.5
apple/mac_os_x_server
10.4.5
Published
Feb 22, 2006
Tracked Since
Feb 18, 2026