Content deleted Content added
m References after punctuation per WP:REFPUNCT, WP:CITEFOOT, WP:PAIC + other fixes |
Citation bot (talk | contribs) Add: date. | Use this bot. Report bugs. | Suggested by Whoop whoop pull up | Category:Web browsers | #UCB_Category 7/125 |
||
Line 29:
| url =
}}
The '''webarchive''' file format is available on [[macOS]] and [[Windows]] for saving and reviewing complete web pages using the [[Safari (web browser)|Safari web browser]].<ref name="folderize">{{cite web |last1=Frakes |first1=Dan |title=De-archive Web Archives |url=https://www.macworld.com/article/1050198/webarchivefolderizer.html |website=Macworld |publisher=IDG Communications |accessdate=15 June 2018}}</ref> The webarchive format differs from a standalone [[HTML]] file because it also saves linked files such as images, [[Cascading Style Sheets|CSS]], and [[JavaScript]].<ref>{{cite web|last1=Arnott|first1=Nick|title=Apple declines to fix vulnerability in Safari's Web Archive files, likely because it requires user action to exploit|url=http://www.imore.com/apple-declines-fix-vulnerability-safaris-webarchive-files-likely-because-it-requires-user-action|website=iMore|date=28 April 2013|publisher=Mobile Nations|accessdate=7 February 2015}}</ref> The webarchive format is a concatenation of source files with filenames saved in the binary [[Property list|plist]] format using NSKeyedArchiver.{{Citation needed|date=October 2008}} Support for webarchive documents was added in Safari 4 Beta on Windows and is included in subsequent versions. Safari in [[iOS 13]] (iPhone and iPad) has support for web archive files.<ref>{{cite web|title=iOS and IPadOS 13 Review|url=https://www.macstories.net/stories/ios-and-ipados-13-the-macstories-review/9/#content|website=MacStories|publisher=MacStories|accessdate=25 September 2019}}</ref> Previously there was a third party iOS app called Web Archive Viewer that provided this functionality.
==Usage==
Line 37:
==Vulnerability==
In February 2013, a vulnerability with the webarchive format was discovered and reported by Joe Vennix, a [[Metasploit Project]] developer. The [[exploit (computer security)|exploit]] allows an attacker to send a crafted webarchive to a user containing code to access [[HTTP cookie|cookies]], local files, and other data. Apple's response to the report was that it will not fix the bug, most likely because it requires action on the users' part in opening the file.<ref>{{cite web|last1=Vennix|first1=Joe|title=Abusing Safari's webarchive file format|url=https://community.rapid7.com/community/metasploit/blog/2013/04/25/abusing-safaris-webarchive-file-format|website=Rapid7 Metasploit|date=25 April 2013|publisher=Rapid7|accessdate=7 February 2015}}</ref>
==Converting for other browsers==
|