Stories
Slash Boxes
Comments

SoylentNews is people

posted by Fnord666 on Friday April 10 2020, @08:45AM   Printer-friendly
from the I-see-you dept.

Bugs that let sites hijack Mac and iPhone cameras fetch $75k bounty:

A security bug that gave malicious hackers the ability to access the cameras of Macs, iPhones, and iPads has fetched a $75,000 bounty to the researcher who discovered it.

In posts published here and here, researcher Ryan Pickren said he discovered seven vulnerabilities in Safari and its Webkit browser engine that, when chained together, allowed malicious websites to turn on the cameras of Macs, iPhones, and iPads. Pickren privately reported the bugs, and Apple has since fixed the vulnerabilities and paid the researcher $75,000 as part of the company's bug bounty program.

Apple tightly restricts the access that third-party apps get to device cameras. For Apple apps, the restrictions aren't quite as stringent. Even then, Safari requires users to explicitly list the sites that are allowed camera access. And beyond that, cameras can only have access to those sites when they are delivered in a secure context, meaning when the browser has high confidence the page is being delivered through an HTTPS connection.

Pickren devised an exploit chain that bypassed these protections. By exploiting multiple vulnerabilities he discovered, the researcher was able to force Safari to treat his malicious proof-of-concept website as if it was Skype.com, which for demonstration purposes was included in the list of trusted sites. (Skype.com doesn't actually support Safari, but Pickren's exploit can spoof any site, including Zoom and Google Hangouts, that does.) The video below shows the result.

[...] The longer of Pickren's two posts, located here, provides a deep dive into the technical details. In an email, Pickren summarized the exploit this way:

My malicious website used a "data URL" to generate a "blob URL" and then used the Location.replace() web API to navigate to it. This tricked Safari into accidentally giving me a malformed "origin" (CVE-2020-3864). With this malformed origin, I used the window.history API to change my URL to "blob://skype.com." From there, I effectively nulled-out my origin to trick Safari into thinking I was in a "secure context" (CVE-2020-3865). Because Safari previously ignored the URL schemes when applying website permissions (CVE-2020-3852), I was able to leverage all of the permissions that the victim granted to the real skype.com.

While the attack chain exploited the vulnerabilities tracked as CVE-2020-3864, CVE-2020-3865, and CVE-2020-3852, Pickren discovered four other flaws that are indexed as CVE-2020-3885, CVE-2020-3887, CVE-2020-9784, & CVE-2020-9787. Apple fixed most of them in late January (see advisories here and here) and patched the remainder last month.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 0) by Anonymous Coward on Friday April 10 2020, @05:35PM

    by Anonymous Coward on Friday April 10 2020, @05:35PM (#980866)

    CVE-2020-3865 is a juicy one! The chain's well researched, but I'm a bit surprised it was only 75k for this volume of successful work.