FILE-OTHER -- Snort detected traffic targeting vulnerabilities in a file type that does not require enough rule coverage to have its own category.
FILE-OTHER Apple Safari WebKit HTMLFrameElementBase isURLAllowed Subframe exploit attempt
Apple Safari WebKit suffers from a universal cross-site scripting vulnerability (UXSS). Using this vulnerability, an attacker is able to exploit a victim's client-side browser or browser extensions in order to run malicious code.
This rule alerts when an attempt is made to trigger a cross-site scripting vulnerability in WebKit.
Public information/Proof of Concept available
No known false positives
Cisco Talos Intelligence Group
No rule groups
Cross Site Scripting (XSS)
Cross Site Scripting (XSS) attackers send malicious input to a site that does not validate the input, usually in the form of a script. The application sends the malicious code to the browsers of other users, which will execute the script unknowingly. The malicious code uses the trust of the host website to access cookies, session tokens, or other sensitive information. There are multiple types of XSS, including Stored, Reflected, and DOM based.
CVE-2019-8762A validation issue was addressed with improved logic. This issue is fixed in Safari 13.0.1, iOS 13.1 and iPadOS 13.1, iCloud for Windows 10.7, tvOS 13, iCloud for Windows 7.14, iTunes 12.10.1 for Windows. Processing maliciously crafted web content may lead to universal cross site scripting.
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org