• Open Menu Close Menu
  • Apple
  • Shopping Bag
  • Apple
  • Mac
  • iPad
  • iPhone
  • Watch
  • TV
  • Music
  • Support
  • Search apple.com
  • Shopping Bag

Lists

Open Menu Close Menu
  • Terms and Conditions
  • Lists hosted on this site
  • Email the Postmaster
  • Tips for posting to public mailing lists
Re: Sparkle updater check vulnerability script
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Sparkle updater check vulnerability script


  • Subject: Re: Sparkle updater check vulnerability script
  • From: Yvan KOENIG <email@hidden>
  • Date: Wed, 10 Feb 2016 19:30:11 +0100

As don't understand what this instruction
set theAppList to do shell script "find " & defaultAppsFolder & " -name Sparkle.framework | awk -F'/' '{print $3}'"
 is doing, I used an alternate scheme to scan the contents of subfolders available in my Applications folder.
I asked EasyFind to search for every file/folder named Sparkle.framework.

I copied the results and paste them in a text window of TextEdit.
I saved this document as "sparkle inside.txt" on the Desktop then I ran this stripped version of the script :

#script stripped
set theSource to (path to desktop as text) & "sparkle inside.txt"
set theAppList to read file theSource
set infoFilePath to "/Contents/info.plist"

set sparkleAppsList to {}
--set theAppList to do shell script "find " & defaultAppsFolder & " -name Sparkle.framework | awk -F'/' '{print $3}'"
set theAppList to paragraphs of theAppList
repeat with i from 1 to number of items in theAppList
set theApp to text of item i of theAppList
set this_item to theApp
set f to this_item & infoFilePath as string
tell application "System Events"
if exists property list file f then
set thePlist to contents of property list file f
set theValue to value of thePlist
try
if exists SUFeedURL of theValue then


set thisSUFeedURL to SUFeedURL of theValue as text
if thisSUFeedURL contains "http:" then
set theResultString to "Application : " & my theApp & " : " & thisSUFeedURL as text
set end of my sparkleAppsList to theResultString & "

"
end if


end if
end try
end if
end tell


end repeat
display dialog "The following apps do not use secure https connections for the Sparkle updater:

" & sparkleAppsList as string buttons "OK" default button "OK" with title "Sparkle Framework Vulnerability Check"

#EOF

I got this list of 32 applications :

Adapter.app : http://www.macroplant.com/adapter/adapterAppcast.xml
ASObjC Explorer 4.app : http://myriad-com.com.au/runner/explorer4_appcast.xml
ASObjC Runner.app : http://myriad-com.com.au/runner/runner_appcast.xml
BatChmod.app : http://www.macchampion.com/arbysoft/batchmodappcast.xml
BetterTouchTool.app : http://appcast.boastr.net
CheatSheet.app : http://mediaatelier.com/CheatSheet/feed.php
DrawIt.app : http://www.bohemiancoding.com/drawit/appcast.xml
Endicia.app : http://endiciaformac.s3.amazonaws.com/EndiciaForMacSparkle.xml
Focus 2.app : http://cdn.macphun.com/updates/Focus2NA/appcast.xml
Focus CK.app : http://cdn.macphun.com/updates/Focus2/appcast.xml
FontDoctor.app : http://server1.fontgear.net/fontdoctor_mac_appcast.xml
Get Backup 2.app : http://www.belightsoft.com/download/updates/appcast_getbackup.xml
GraphicConverter 9.app : http://www.lemkesoft.org/files/graphicconverter/graphicconverter9.xml
GraphicConverter.app : http://www.lemkesoft.org/files/graphicconverter/graphicconverter.xml
Image Tricks Lite.app : http://www.belightsoft.com/download/updates/appcast_imagetricks_lite.xml
Isolator.app : http://willmore.eu/software/isolator/releases.xml
Key Codes.app : http://manytricks.com/keycodes/appcast.xml
Language Switcher.app : http://feeds.tj-hd.co.uk/feeds/language_switcher/appcast.xml
Malwarebytes Anti-Malware.app : http://data-cdn.mbamupdates.com/v1/mbam-mac/updates.xml
Mp4Split.app : http://popmedic.com/mp4split_builds/appcast.xml
Notational Velocity.app : http://notational.net/nvupdates.xml
Photo Zoe Editor.app : http://fluidapp.com/appcast/fluidapp.rss
Radium.app : http://www.catpigstudios.com/Radium/updates/appcast.xml
Raw Photo Processor 64.app : http://www.raw-photo-processor.com/rpp_updates.xml
Skim.app : http://skim-app.sourceforge.net/skim.xml
SnapNDrag.app : http://yellowmug.com/snapndrag/appcast.xml
Spectacle.app : http://spectacleapp.com/updates/appcast.xml
StuffIt Expander.app : http://www.producturlsupport.com/cgi-bin/cscgi.pl
Suitcase Fusion 6.app : http://www.extensis.com/u/ST/EN/suitcase17en.xml
ThisService.app : http://wafflesoftware.net/thisservice/sparkle/sparkle.xml
VLC.app : http://update.videolan.org/vlc/sparkle/vlc-intel64.xml
VOX.app : http://updates.devmate.com/com.coppertino.Vox.xml

Yvan KOENIG (VALLAURIS, France) mercredi 10 février 2016 19:29:38


 _______________________________________________
Do not post admin requests to the list. They will be ignored.
AppleScript-Users mailing list      (email@hidden)
Help/Unsubscribe/Update your Subscription:
Archives: http://lists.apple.com/archives/applescript-users

This email sent to email@hidden

  • Follow-Ups:
    • Re: Sparkle updater check vulnerability script
      • From: Yvan KOENIG <email@hidden>
References: 
 >Re: Sparkle updater check vulnerability script (From: sqwarqDev <email@hidden>)
 >Re: Sparkle updater check vulnerability script (From: 2551phil <email@hidden>)
 >Re: Sparkle updater check vulnerability script (From: Bill Cheeseman <email@hidden>)
 >Re: Sparkle updater check vulnerability script (From: 2551phil <email@hidden>)
 >Re: Sparkle updater check vulnerability script (From: Bill Cheeseman <email@hidden>)
 >Re: Sparkle updater check vulnerability script (From: 2551phil <email@hidden>)
 >Re: Sparkle updater check vulnerability script (From: Yvan KOENIG <email@hidden>)
 >Re: Sparkle updater check vulnerability script (From: 2551phil <email@hidden>)
 >Re: Sparkle updater check vulnerability script (From: 2551phil <email@hidden>)

  • Prev by Date: Re: PSA: Does your app use Sparkle? Update it, or use an HTTPS server
  • Next by Date: Re: Sparkle updater check vulnerability script
  • Previous by thread: Re: Sparkle updater check vulnerability script
  • Next by thread: Re: Sparkle updater check vulnerability script
  • Index(es):
    • Date
    • Thread