Security News > 2020 > October > Five bag $300,000 in bug bounties after finding 55 security holes in Apple's web apps, IT infrastructure
A team of vulnerability spotters have netted themselves a six-figure payout from Apple after discovering dozens security holes in the Cupertino giant's computer systems, some of which could have been exploited to steal iOS source code, and more.
Curry said the group decided to target Apple's public-facing networks in July, a few weeks after seeing the story of Bhavuk Jain, who earned $100,000 for finding a bug in Apple's customer sign-in system.
"The information obtained by these processes were useful in understanding how authorization/authentication worked across Apple, what customer/employee applications existed, what integration/development tools were used, and various observable behaviors like web servers consuming certain cookies or redirecting to certain applications," explained Curry.
"After all of the scans were completed and we felt we had a general understanding of the Apple infrastructure, we began targeting individual web servers that felt instinctively more likely to be vulnerable than others."
Among the more interesting findings was a cross-site scripting flaw in the iTunes Banner Builder that could be exploited to steal the secret EC2 and IAM keys for some AWS-hosted Apple servers.
News URL
https://go.theregister.com/feed/www.theregister.com/2020/10/09/apple_bug_bounty_vulnerabilities/
Related news
- Apple Opens PCC Source Code for Researchers to Identify Bugs in Cloud AI Security (source)
- The story behind the Health Infrastructure Security and Accountability Act (source)
- AI’s impact on the future of web application security (source)
- Here's what happens if you don't layer network security – or remove unused web shells (source)