Safari's AutoFill feature is enabled by default and will fill in information such as first and last name, work place, city, state, and email address when it recognizes a form, wrote Jeremiah Grossman, CTO for WhiteHat Security, on his blog. The information comes from Safari's local operating system address book.
The feature dumps the data into the form even if a person has entered no data on a particular website, which opens up an opportunity for a hacker.
Proof-of-concept code for an attack has been published on the blog of Robert Hansen, CEO of SecTheory. Grossman also posted a video of the attack on his blog.
For some reason, data beginning with numbers won't populate text fields and can't be obtained. "Still, such attacks could be easily and cheaply distributed on a mass scale using an advertising network where likely no one would ever notice because it's not exploit code designed to deliver rootkit payload," Grossman wrote.
"In fact, there is no guarantee this has not already taken place," he wrote. "What is safe to say is that this vulnerability is so brain dead simple that I assumed someone else must have publicly reported it already, but exhaustive searches and asking several colleagues turned up nothing."
Grossman reported the problem to Apple on June 17, but he has yet to receive a personalized reply.
To avoid this issue, users can simply disable AutoFill Web forms, he wrote.
Send news tips and comments to email@example.com.