Hacker News new | past | comments | ask | show | jobs | submit login
Apple.com XSS attack (imgur.com)
66 points by NathanKP on Nov 3, 2009 | hide | past | favorite | 31 comments



As I mentioned on proggit, that URL doesn't actually demonstrate cross-site scripting, but it looks like the page is vulnerable to iframe and scripting insertion too. Example:

   http://www.apple.com/itunes/affiliates/download/?artistName=<iframe+id%3D"frame"+src%3D"http://www.microsoft.com/"+style%3D"width:+600px;+height:+400px;"></iframe>&thumbnailUrl=http://www.straitstimes.com/STI/STIMEDIA/image/20090501/windows7-microsoft.jpg&itmsUrl=http://www.microsoft.com&albumName=Better+Operating+System


That is really bad. If you can insert code then you can probably do other even worse things.


Probably steal session cookies, then hijack sessions and grab any personal data etc :/ Not good.


Someone could make an iframe with what looked like the Apple login and trick people into "logging in". Then they distribute the URL via shortened URLs through Twitter and grab a bunch of Apple logins.

Free iTunes until you get caught. Chances are Apple would be able to track who downloaded what onto what Apple devices. I'm sure retribution would be swift and thorough.

In my opinion that does count as an XSS attack, though it perhaps does not use the traditional techniques. (This for those who have said that this is actually not an XSS attack.)



I think Apple fixed it?


It looks like they just removed the functionality. So it is fixed for now. It was fun while it lasted. ;)


Anyone have a screenshot? I seem to have missed all the fun.




It looks like the "XSS" bug is mostly client-side, I think that the GET contents are presented using JS: http://grab.by/exu (that's with the given URL).

It doesn't allows any kind of <script> tag, so yeah, it's fun and a bit insecure (may be used for phishing?? dunno), but it's not the worst at all.


It allows you to put javascript in a click handler:

http://www.apple.com/itunes/affiliates/download/?artistName=...


I was wrong, you're right! Now that's medium-insecure. But still not to panic at this, just XSS and client-side (everything is inserted by JS). Well, there are worst things, right? :)


"just" XSS?


On Safari the click handler works but the image just shows up as an error, not a "Click Me" message.


Pretty much anything works; such as this. :)

http://www.apple.com/itunes/affiliates/download/?artistName=...


Yep you can do just about anything that you want.

http://www.apple.com/itunes/affiliates/download/?artistName=...

I'm sure that when Apple finds this they'll close the gap pretty fast though.


Looks like they already did. For Posterity, here's a screenshot:

http://visualmotive.com/etc/apple_xss.png


still works. Jeez that is pretty bad. How does one go about reporting something like this? Wonder how long it will take to fix...


They have a bug reporting mechanism for people who are ADC(free) members or iPhone developers: http://www.devworld.apple.com/bugreporter/


Looks like they fixed the glitch.


No they haven't, not as of yet.


You are absolutely right. Sorry about the false alarm.

Seems like it doesn't work in latest WebKit?


That is a possibility.


tiiiu


Complexity kills. Rich Internet Apps will kill all operating systems... except for OpenBSD.


Why will OpenBSD be immune?


Because it does not try to keep up with the fast-paced, complex flaws of Rich Internet Apps written by people who have no knowledge of information security and are only interested in getting attention for themselves and their shitty start-up.


Thereby rendering it unusable by people who want to create RIAs yet have deep knowledge of information security?


Hate to say it, but Firefox on OpenBSD is as vulnerable to this bug as any other browser. Of course, I doubt OpenBSD users have iTunes accounts...


I have an iTunes account.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: