Apple pays $5,000 bug bounty for iCloud XSS bug discovery

| |

A safety researcher from India was awarded $5,000 from Apple through its bug bounty program, after discovering a cross-site scripting (XSS) flaw in iCloud. For the reason that discovery of the problem, Apple has patched the problem in iCloud.com.

The vulnerability discovered by Vishal Bharad concerned making a file in Pages or Keynotes on the iCloud web site, a part of Apple’s iWork bundle. The file was created with a selected identify that contained the specified XSS payload.

After sending the file to a different consumer or collaborating with them, the attacker then needed to make adjustments to the doc and put it aside, the researcher suggested in a weblog put up. Altering “Browse All Variations” in Settings then triggers the operating of the XSS payload on the opposite consumer’s system.

The bug has been recognized to Apple for fairly some time, with Bahrad disclosing it to the corporate on August 7, 2020. After reviewing the report and the steps to breed, in addition to a video demonstrating the bug, Apple awarded Bharad with $5,000 on October 9. Bharad publicly disclosed the flaw on February 14.

The researcher admitted that the bug was found as a part of a fishing journey to attempt to uncover a minimum of one difficulty with the iCloud web site. After failing to seek out points in areas comparable to CSRF, IDOR, and enterprise logic bugs, Bharad then moved onto XSS bug-finding, a weak space for the researcher.

They then “inserted payloads all over the place” in a bid to seek out methods to view and set off a payload that wasn’t beforehand found, which they in the end managed to perform.

On Thursday, Apple revealed an in depth information to safety mechanisms included in its software program and {hardware} merchandise. This included updates on security measures referring to the M1 chip, the iMessage sandboxing mechanism referred to as BlastDoor, and its bug bounty program.

Apple opened up its bug bounty program to all researchers in 2019 similtaneously rising the charges of pay for disclosed bugs to a ceiling of $1 million in restricted instances. The profitable rewards have attracted many to begin taking up Apple’s safety.

One “Signal In with Apple” vulnerability disclosed in Could 2020 earned its discoverer $100,000, whereas a group of researchers spent three months hacking Apple and earned greater than $50,000 in October.

On February 10, it was revealed a safety researcher had hacked the interior methods of a number of main firms, together with Apple, Microsoft, and PayPal. They earned greater than $130,000 in bug bounties, with Apple contributing $30,000.

Previous

How to buy Bitcoin and other cryptocurrencies on iPhone and Mac

30K Macs are infected with ‘Silver Sparrow’ virus and no one knows why

Next

Leave a Comment