{"id":30387,"date":"2020-10-08T16:16:12","date_gmt":"2020-10-08T20:16:12","guid":{"rendered":"https:\/\/mjtsai.com\/blog\/?p=30387"},"modified":"2021-07-13T11:52:47","modified_gmt":"2021-07-13T15:52:47","slug":"we-hacked-apple-for-3-months","status":"publish","type":"post","link":"https:\/\/mjtsai.com\/blog\/2020\/10\/08\/we-hacked-apple-for-3-months\/","title":{"rendered":"We Hacked Apple for 3 Months"},"content":{"rendered":"<p><a href=\"https:\/\/samcurry.net\/hacking-apple\/\">Sam Curry<\/a> (via <a href=\"https:\/\/twitter.com\/stroughtonsmith\/status\/1314223580733988865\">Steve Troughton-Smith<\/a>, <a href=\"https:\/\/news.ycombinator.com\/item?id=24718078\">Hacker News<\/a>):<\/p>\n<blockquote cite=\"https:\/\/samcurry.net\/hacking-apple\/\"><p>Between the period of July 6th to October 6th myself, Brett Buerhaus, Ben Sadeghipour, Samuel Erb, and Tanner Barnes worked together and hacked on the Apple bug bounty program.<\/p>\n<p>[&#8230;]<\/p>\n<p>During our engagement, we found a variety of vulnerabilities in core portions of their infrastructure that would&rsquo;ve allowed an attacker to fully compromise both customer and employee applications, launch a worm capable of automatically taking over a victim&rsquo;s iCloud account, retrieve source code for internal Apple projects, fully compromise an industrial control warehouse software used by Apple, and take over the sessions of Apple employees with the capability of accessing management tools and sensitive resources.<\/p>\n<p>There were a total of 55 vulnerabilities discovered with 11 critical severity, 29 high severity, 13 medium severity, and 2 low severity reports.<\/p><\/blockquote>\n<p>Most have already been fixed.<\/p>\n\n<p><a href=\"https:\/\/samcurry.net\/hacking-apple\/#vuln5\">One example<\/a>:<\/p>\n<blockquote cite=\"https:\/\/samcurry.net\/hacking-apple\/#vuln5\"><p>During testing the iCloud application we noticed that you could open up certain attachments from the iCloud mail application in the iCloud pages application via the &ldquo;Open in Pages&rdquo; functionality. When you submitted the form to do this, it sent an HTTP request containing a URL parameter which included the URL of the mail file attachment in the request.[&#8230;] If you attempted to modify this URL to something arbitrary[&#8230;] Our proof of concept for this report was demonstrating we could read and access Apple&rsquo;s internal maven repository which contained the source code for what appeared to be hundreds of different applications, iOS, and macOS.\n\n<\/p><\/blockquote>\n\n<p><a href=\"https:\/\/twitter.com\/_bazad\/status\/1312116414816239617\">Brandon Azad<\/a>:<\/p>\n<blockquote cite=\"https:\/\/twitter.com\/_bazad\/status\/1312116414816239617\">\n<p>It&rsquo;s with both bittersweet sadness and excitement that I say goodbye to Project Zero, as I&rsquo;ll be joining Apple next week to continue my work improving Apple device security.<\/p>\n<\/blockquote>\n\n<p>Previously:<\/p>\n<ul>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2020\/10\/08\/windows-xp-source-code-leaked\/\">Windows XP Source Code Leaked<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2020\/10\/07\/checkra1n-t2-exploit\/\">checkra1n T2 Exploit<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2020\/07\/22\/apple-security-research-device-program\/\">Apple Security Research Device Program<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2019\/12\/20\/mac-bug-bounty-program-opens\/\">Mac Bug Bounty Program Opens<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2019\/09\/06\/apple-responds-to-project-zero\/\">Apple Responds to Project Zero<\/a><\/li>\n<\/ul>\n\n<p id=\"we-hacked-apple-for-3-months-update-2020-10-09\">Update (2020-10-09): <a href=\"https:\/\/twitter.com\/samwcyo\/status\/1314310787243167744\">Sam Curry<\/a>:<\/p>\n<blockquote cite=\"https:\/\/twitter.com\/samwcyo\/status\/1314310787243167744\">\n<p>Within the article I&rsquo;d mentioned that Apple had not yet paid for all of the vulnerabilities. Right after publishing it, they went ahead and paid for 28 more of the issues making the running total $288,500.<\/p>\n<\/blockquote>","protected":false},"excerpt":{"rendered":"<p>Sam Curry (via Steve Troughton-Smith, Hacker News): Between the period of July 6th to October 6th myself, Brett Buerhaus, Ben Sadeghipour, Samuel Erb, and Tanner Barnes worked together and hacked on the Apple bug bounty program. [&#8230;] During our engagement, we found a variety of vulnerabilities in core portions of their infrastructure that would&rsquo;ve allowed [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"apple_news_api_created_at":"2020-10-08T20:16:16Z","apple_news_api_id":"ebde1ac1-3cf8-4e67-b77c-d4dbf23a5764","apple_news_api_modified_at":"2021-07-13T15:52:50Z","apple_news_api_revision":"AAAAAAAAAAAAAAAAAAAAAw==","apple_news_api_share_url":"https:\/\/apple.news\/A694awTz4Tme3fNTb8jpXZA","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_is_hidden":false,"apple_news_is_paid":false,"apple_news_is_preview":false,"apple_news_is_sponsored":false,"apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":"\"\"","apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[2],"tags":[38,2098,131,2095,16,31,30,472,48,96],"class_list":["post-30387","post","type-post","status-publish","format-standard","hentry","category-technology","tag-apple","tag-apple-security-bounty","tag-bug","tag-exploit","tag-icloud","tag-ios","tag-mac","tag-pages","tag-security","tag-web"],"apple_news_notices":[],"_links":{"self":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/30387","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/comments?post=30387"}],"version-history":[{"count":3,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/30387\/revisions"}],"predecessor-version":[{"id":30399,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/30387\/revisions\/30399"}],"wp:attachment":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/media?parent=30387"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/categories?post=30387"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/tags?post=30387"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}