Categories: NewsTech

Apple pays US$100,000 to developer who finds critical bug with “Sign in with Apple”

To many users (including this writer), the options to sign in to 3rd party services with your Google, Facebook, and Apple accounts is probably the most convenient way to log in. Apple, for their part, made it clear that “Sign in with Apple” is an option that puts privacy first.

Now, a new bug that could have critically affected the privacy of “Sign in with Apple” users has been discovered. The Apple Security Bounty program, which rewards devs who discover security flaws—and report them—has just paid out US$100,000 to Bhavuk Jain, a researcher from India.

The bug has since been patched by Apple, and Jain also published an explanation that reveals the severity of the flaw.

“Full account takeover of user accounts” could have happened

Jain explains that the bug is related to the validation done by Apple on the client side of things, calling it a “zero-day” bug. Had the bug not been reported and patched, it could even have meant full access to 3rd party user accounts by malicious parties.

So, how does it work?

When a user signs in with their Apple account on supported 3rd party sites, a JSON Web Token (JWT) that holds authenticating information is generated. However, despite a requirement for users to log into their Apple accounts, Apple servers did not validate if the request for the JWT was from the same user during the next step.

JWTs can be requested for any Apple ID email, and so long as they are verified, they will be valid to Apple’s servers. And without the extra validation step, this could have potentially led to remote access for attackers by forging a JWT during the process.

“I found I could request JWTs for any Email ID from Apple and when the signature of these tokens was verified using Apple’s public key, they showed as valid. This means an attacker could forge a JWT by linking any Email ID to it and gaining access to the victim’s account.”

The bug has now reportedly been patched, which is certainly good news. Jain warns that vulnerability extended to some pretty widely-used applications—Dropbox, Spotify, Airbnb, Giphy, to name a few. Apple has also claimed that there was “no misuse or account compromise” due to this particular flaw, according to Jain.

Regardless, Jain picked up US$100,000 (~RM432K) for his efforts:

“A huge thanks to the Apple Security Team.”

[ SOURCE ]

Related reading

Recent Posts

TNB Electron opens 8x DC charge points to the public at TNB Bangsar

TNB Electron has been busy just before the Raya holiday season. After turning on their…

19 hours ago

DC Handal deploys 60kW DC Charger at Genting Indahpura Sales Gallery Johor

DC Handal has deployed an EV Charger at Genting Indahpura Sales Gallery in Johor, which…

2 days ago

Gentari 100kW DC Charger at BYD Harmony Auto Hartamas now open to the public

Gentari now has a public DC charger in front of a BYD 3S dealership at…

2 days ago

ChargEV deploys 60kW DC Charger at Eco Grandeur, Utopia East. RM1.12/kWh for limited time

ChargEV has deployed a new DC charger at Eco Grandeur located at Utopia East. This…

2 days ago

Tecno Camon 50 Ultra goes official in Malaysia: 144Hz AMOLED screen, 50MP cameras, 6500mAh battery, priced from RM1,499

Just less than two weeks after Tecno launched its latest Camon 50 series of smartphones…

2 days ago

Is Your Current Phone Generations Behind? Here’s a Simpler Way to Close the Gap

This post is brought to you by Unifi Mobile. If you’ve been using the same…

2 days ago

This website uses cookies.