Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Safari Bug Found After Apple Took Almost a Year to Patch it!

Safari Bug Found After Apple Took Almost a Year to Patch it!

A Polish security researcher has revealed a flaw in a cross-browser sharing API that could let attackers steal user files.

The researcher disclosed details of an Apple Safari web browser security hole that could leak files with other browsers & applications & allow exploitation by attackers. The news came only after Apple explained it would delay patching the vulnerability for almost a year! The researcher rated the bug as “not very serious”.

Web Share API

Pawel Wylecial, Co-Founder of REDTEAM.PL flagged the issue. He blamed this bug on Safari’s implementation of the Web Share API, mentions a blog post  on Mon. outlining his work. The  quite new API lets users share links from the browser via 3rd-party applications, e.g. those distributed via mail & messaging apps.

Core issue is the implementation’s file: scheme in both the mobile & desktop versions of Safari, which gives access to files stored on the user’s local hard drive.

Unknowingly, they can share personal files or data with a bad site, while believing they are only sharing an article or link with friends, Wylecial explained.

Local File Disclosure

“The problem is that file:  scheme is allowed, & when a website points to such URL unexpected behaviour occurs,” Wylecial explained further.

“In case such a link is passed to the navigator.share function an actual file from the user file system is included in the shared message, which leads to local file disclosure when a user is sharing it unknowingly.”

Remotely Control

Wylecial agreed that the “problem is not very serious” because it requires a user to act instead of allowing an attacker to remotely control someone’s system without their knowledge.

However, he observed it’s not difficult to make the shared file ‘invisible’ to the user, comparing the capability the flaw gives an attacker to ‘click-jacking’ in the way it aims “to convince the unsuspecting user to perform some action,” he commented.

Slow Approach

That the bug is not highly serious may be irrelevant. Wylecial’s disclosure again highlight’s Apple’s slow approach to patching vulnerabilities discovered by 3rd-party researchers as well as a historically bad relationship with them.

Wylecial reported the bug to Apple on April 17, with the company agreeing 4 days later that they received his report. After much discussion earlier this month, Apple outlined that it would address the issue in the Spring 2021 Safari update, which would be nearly a year after the issue was flagged.

This led to Wylecial revealing his research, he explained. He commented that he told Apple “that waiting with the disclosure for almost an additional year, while 4 months already have passed since reporting the issue, is not reasonable.” Then he went public.

Bug Bounty Program

The disclosure shows the ongoing tension between Apple & security researchers, which many thought was on its way to being solved when the company finally opened its bug bounty program to the public in December 2019, a move announced 4 months before at Black Hat in August.

The revamped public program boosted pay-outs & expanded the platform playing field for researchers over the previous program, which was invite-only with rewards only as high as $200,000 on limited platforms.

$1 million

Now, researchers can receive up to $1m for the most critical of zero-day flaws on its latest hardware, & between $25,000 to $500,000 for discovering vulnerabilities in range of other products, including Macs, iPhone & iPad, & Apple TV.

Even after these changes, some researchers, including Google’s Project Zero Ian Beer who discovered a number of zero-day iOS flaws, didn’t participate in the Apple bug bounty program.

https://www.cybernewsgroup.co.uk/virtual-conference-september/

 

SHARE ARTICLE