Apple Pays $100.5k ‘Bug Bounty’ for Mac Webcam Hack!

Apple Pays $100.5k ‘Bug Bounty’ for Mac Webcam Hack!

A researcher who showed Apple how its webcams can be hijacked via a universal cross-site scripting bug (UXSS) Safari bug has been awarded what is reportedly a record $100,500 ‘bug bounty’. The bug could be used by an adversary as part of an attack to gain full access to every website ever visited by the victim.

The researcher found that he could gain unauthorised camera access via a shared iCloud document that could also “hack every website you’ve ever visited.”

Not 1st Time

The bug-finder is Ryan Pickren, founder of proof-of-concept sharing platform BugPoC & a former Amazon Web Services security engineer. This isn’t the 1st time he’s found bugs that let him fool Apple’s cameras: In 2020, he discovered vulnerabilities in the Safari browser that could be used to spy on iPhones, iPads & Mac computers using their microphones & cameras, just by convincing a target to click 1 malicious link.

This time, according to Pickren, he found a series of flaws – in Safari 15 & iCloud Sharing – that could again lead to unauthorised camera access, which would again allow an attack to be launched from a malicious site.

Hack Every Website

His more recent find is worse: It could also enable a shared iCloud document to “hack every website you’ve ever visited,” he stated, & could steal permissions to use multimedia – the microphone, camera & screensharing.

Pickren reported that the same hack could result in an attacker gaining full access to a device’s entire filesystem, by exploiting Safari’s web-archive files, which are the files Safari creates as an alternative to HTML when it saves a website locally.

Pickren submitted the bugs to Apple last July. The iPhone-maker patched the issues earlier this month & then awarded the $100,500 bug bounty to Pickren.

Bugs

The issues are found in ShareBear, a behind-the-scenes iCloud file-sharing app that prompts users when they try to open a shared document for the 1st time & only the 1st time. Since users are not presented with the display again once they have accepted the prompt to open the file, Pickren found that anyone who has access to the file can alter the file’s content after that occurs.

“ShareBear will then download & update the file on the victim’s machine without any user interaction or notification,” Pickren explained in his technical write-up.

“In essence, the victim has given the attacker permission to plant a polymorphic file onto their machine & the permission to remotely launch it at any moment.”

3 Steps

These 3 steps are involved in using ShareBear to download & open a webarchive file:

  1. Trick the victim into giving permission to plant the polymorphic file;
  2. Turn an image file with a .PNG format – he gave the example of puppies.png – into an executable binary (“evil.dmg) after a user has agreed to open it & then to open it;
  3. The binary triggers an exploit chain that uses other defects discovered in Safari in order to take over the machine’s microphone or webcam, or even to steal local files.

4 Zero-Day Bugs

Pickren identified 4 zero-day bugs, the following of which have received CVE tracking numbers:

The bug could allow a malicious application to bypass checks done by Gatekeeper: a macOS security feature that attempts to reduce the likelihood of inadvertently executing malware by enforcing code signing and verifying downloaded applications before allowing them to run.

  • CVE-2021-30975: An issue in macOS Monterey’s Script Editor with a base criticality score of High – 8.6 – that may allow a malicious OSAX scripting addition to bypass Gatekeeper checks & avoid sandbox restrictions. Apple addressed the issue by disabling execution of JavaScript when viewing a scripting dictionary.

More Dangerous

“This project was an interesting exploration of how a design flaw in 1 application can enable a variety of other, unrelated, bugs to become more dangerous,” Pickren concluded.

“It was also a notable example of how even with macOS Gatekeeper enabled, an attacker can still achieve a lot of mischief by tricking approved apps into doing malicious things.”

 

SHARE ARTICLE