Indian Man Rewared Rs 75.3 Lakh For Finding A Dangerous Bug In Sign In With Apple
Dhir Acharya - Jun 01, 2020
Apple has paid a Rs 75.3 lakh ($100,000) bounty to developer Bhavuk Jain for finding a major bug in Apple's login system, “Sign in with Apple.”
- Apple Kills Original HomePod, Focusing On HomePod Mini
- iPhone 12 Color Is Fading Away Quickly And No One Knows Why
- Apple Sues Ex-Employee For Stealing Company’s Secrets To The Media
Apple has paid a Rs 75.3 lakh ($100,000) bounty to developer Bhavuk Jain for finding a major bug in Apple's login system, “Sign in with Apple.” The discovered bug could have let bad actors take over an account on certain apps and websites.
Jain said that the bug was related to how the iPhone maker was validating users when using Sign in with Apple. Released in 2019, the system can be used with Apple IDs, meant to help users avoid being tracked through using other login services, Google and Facebook for example. One key selling point of this login system is the ability to hide users’ emails from third parties.
Sign in with Apple authorizes a user by using a JSON Web Token (JWT), a code created by Apple’s servers. During the authorization process in an app, Apple allows users to opt for sharing or hiding their Apple ID with that third party. If the user chooses not to share with an app, the system will generate an Apple email ID for the user to use in that service.
Once the authorization is completed, depending on the user’s choice, Apple will generate a JWT containing the email ID. They can log into the third-party app using this email ID. And here’s where the bug attacks.
According to Jain, he found in April that he could request a JWT for any Apple email ID.
“When the signature of these tokens was verified using Apple’s public key, they showed as valid. This means an attacker could forge a JWT by linking any email ID to it and gaining access to the victim’s account.”
The Hacker News reported that the developer found the cause of this: users were required to log into their Apple accounts before the authorization request was initiated. The system wasn’t validating if the same person requested a token in the next step from its authentication server.
This bug affected third-party apps that were using the system instead of implementing their own additional security measures.
As pointed out by the Hacker News, this vulnerability could be exploited by bad actors even if the user opted for hiding their Apple email ID from third parties and that they could use the flaw to sign up a new account with their victim’s Apple ID.
Jain explained that this vulnerability is serious because it could have let a bad actor completely take over an account. Many developers have integrated Sign in with Apple as it’s mandatory for apps supporting other social logins like Giphy, Spotify, Dropbox, and Airbnb.
According to Jain, Apple had conducted an investigation and said it didn’t find any account compromise or misuse due to this vulnerability.
Comments
Sort by Newest | Popular