{"id":18486,"date":"2020-06-02T11:00:00","date_gmt":"2020-06-02T11:00:00","guid":{"rendered":"https:\/\/icrowdnewswire.com\/?p=2577626"},"modified":"2020-06-02T11:00:00","modified_gmt":"2020-06-02T11:00:00","slug":"apple-fixes-bug-that-could-have-given-hackers-full-access-to-user-accounts","status":"publish","type":"post","link":"http:\/\/ipsnews.net\/business\/2020\/06\/02\/apple-fixes-bug-that-could-have-given-hackers-full-access-to-user-accounts\/","title":{"rendered":"Apple fixes bug that could have given hackers full access to user accounts"},"content":{"rendered":"<h2>Report of serious vulnerability lands developer $100,000 bounty.<\/h2>\n<section class=\"post-meta\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2020\/06\/sign-in-with-apple-800x436.jpg\" alt=\"Photograph of multiple Apple devices lined up together.\" width=\"702\" height=\"383\" \/><\/section>\n<section class=\"post-meta\">\n<p>Sign in with Apple&mdash;a privacy-enhancing tool that lets users log into third-party apps without revealing their email addresses&mdash;just fixed a bug that made it possible for attackers to gain unauthorized access to those same accounts.<\/p>\n<p>&ldquo;In the month of April, I found a zero-day in Sign in with Apple that affected third-party applications which were using it and didn&rsquo;t implement their own additional security measures,&rdquo; app developer Bhavuk Jain&nbsp;<a href=\"https:\/\/bhavukjain.com\/blog\/2020\/05\/30\/zeroday-signin-with-apple\/\">wrote on Sunday<\/a>. &ldquo;This bug could have resulted in a full account takeover of user accounts on that third party application irrespective of a victim having a valid Apple ID or not.&rdquo;<\/p>\n<p>Jain privately reported the flaw to Apple under the company&rsquo;s bug bounty program and received a hefty $100,000 payout. The developer shared details after Apple updated the sign-in service to patch the vulnerability.<\/p>\n<p>Sign in with Apple&nbsp;<a href=\"https:\/\/support.apple.com\/en-us\/HT210318\">debuted in October<\/a>&nbsp;as an easier and more secure and private way to sign into apps and websites. Faced with a mandate that many third-party iOS and iPadOS apps offer the option to sign in with Apple, a host of high-profile services entrusted with huge amounts of sensitive user data use adopted it.<\/p>\n<p>Instead of using a social media account or email address, filling out Web forms, and choosing an account-specific password, iPhone and iPad users can tap an button and sign in with Face ID, Touch ID, or a device passcode. The bug opened users to the possibility their third-party accounts would be completely hijacked.<\/p>\n<p>The sign-in service, which works similarly to the&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/OAuth\">OAuth 2.0 standard<\/a>, logs in users by using either a JWT&mdash;short for JSON Web Token&mdash;or a code generated by an Apple server. In the latter case, the code is then used to generate a JWT. Apple gives users the option of sharing the Apple email ID with the third party or keeping the ID hidden. When users hide the ID, Apple creates a JWT that contains a user-specific relay ID.<\/p>\n<p>&ldquo;I found I could request JWTs for any Email ID from Apple and when the signature of these tokens was verified using Apple&rsquo;s public key, they showed as valid,&rdquo; Jain wrote. &ldquo;This means an attacker could forge a JWT by linking any Email ID to it and gaining access to the victim&rsquo;s account.&rdquo;<\/p>\n<p>There&rsquo;s no indication the bug was ever actively exploited.<\/p>\n<\/section>\n<p class=\"tags\">\n<div><strong>See Campaign: <\/strong><a href=\"https:\/\/en.wikipedia.org\/wiki\/OAuth\" target=\"_blank\">https:\/\/en.wikipedia.org\/wiki\/OAuth<\/a><br \/><b>Contact Information:<\/b><br \/>DAN GOODIN<\/p>\n<p><b>Tags:<\/b><br \/><a href=\"\"><\/a>, <a href=\"https:\/\/icrowdnewswire.com\/category\/news-category\/wire\/\" rel=\"category tag\">Wire<\/a>, <a href=\"https:\/\/icrowdnewswire.com\/category\/global-regions\/united-states\/\" rel=\"category tag\">United States<\/a>, <a href=\"https:\/\/icrowdnewswire.com\/category\/language\/english\/\" rel=\"category tag\">English<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"\" alt=\"image\" width=\"400\" height=\"300\" class=\"cwdfimg\" \/><\/div>\n<div>\n<h3>Contact Information:<\/h3>\n<p>DAN GOODIN<\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Report of serious vulnerability lands developer $100,000 bounty. Sign in with Apple&mdash;a privacy-enhancing tool that lets users log into third-party apps without revealing their email addresses&mdash;just fixed a bug that made it possible for attackers to gain unauthorized access to those same accounts. &ldquo;In the month of April, I found a zero-day in Sign in &hellip; <a href=\"https:\/\/icrowdnewswire.com\/2020\/06\/02\/apple-fixes-bug-that-could-have-given-hackers-full-access-to-user-accounts\/\">Continue reading <span>Apple fixes bug that could have given hackers full access to user accounts<\/span><\/a> <a href=\"http:\/\/ipsnews.net\/business\/2020\/06\/02\/apple-fixes-bug-that-could-have-given-hackers-full-access-to-user-accounts\/\" class=\"more-link\">Continue Reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":47,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,22,54],"tags":[],"class_list":["post-18486","post","type-post","status-publish","format-standard","hentry","category-english","category-united-states","category-wire"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Apple fixes bug that could have given hackers full access to user accounts - Business<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/ipsnews.net\/business\/2020\/06\/02\/apple-fixes-bug-that-could-have-given-hackers-full-access-to-user-accounts\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple fixes bug that could have given hackers full access to user accounts - Business\" \/>\n<meta property=\"og:description\" content=\"Report of serious vulnerability lands developer $100,000 bounty. Sign in with Apple&mdash;a privacy-enhancing tool that lets users log into third-party apps without revealing their email addresses&mdash;just fixed a bug that made it possible for attackers to gain unauthorized access to those same accounts. &ldquo;In the month of April, I found a zero-day in Sign in &hellip; Continue reading Apple fixes bug that could have given hackers full access to user accounts Continue Reading &rarr;\" \/>\n<meta property=\"og:url\" content=\"http:\/\/ipsnews.net\/business\/2020\/06\/02\/apple-fixes-bug-that-could-have-given-hackers-full-access-to-user-accounts\/\" \/>\n<meta property=\"og:site_name\" content=\"Business\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-02T11:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2020\/06\/sign-in-with-apple-800x436.jpg\" \/>\n<meta name=\"author\" content=\"Bilal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bilal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"http:\/\/ipsnews.net\/business\/2020\/06\/02\/apple-fixes-bug-that-could-have-given-hackers-full-access-to-user-accounts\/\",\"url\":\"http:\/\/ipsnews.net\/business\/2020\/06\/02\/apple-fixes-bug-that-could-have-given-hackers-full-access-to-user-accounts\/\",\"name\":\"Apple fixes bug that could have given hackers full access to user accounts - Business\",\"isPartOf\":{\"@id\":\"https:\/\/ipsnews.net\/business\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\/\/ipsnews.net\/business\/2020\/06\/02\/apple-fixes-bug-that-could-have-given-hackers-full-access-to-user-accounts\/#primaryimage\"},\"image\":{\"@id\":\"http:\/\/ipsnews.net\/business\/2020\/06\/02\/apple-fixes-bug-that-could-have-given-hackers-full-access-to-user-accounts\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2020\/06\/sign-in-with-apple-800x436.jpg\",\"datePublished\":\"2020-06-02T11:00:00+00:00\",\"author\":{\"@id\":\"https:\/\/ipsnews.net\/business\/#\/schema\/person\/70b05bacee6cf8a877350412fae25e20\"},\"breadcrumb\":{\"@id\":\"http:\/\/ipsnews.net\/business\/2020\/06\/02\/apple-fixes-bug-that-could-have-given-hackers-full-access-to-user-accounts\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/ipsnews.net\/business\/2020\/06\/02\/apple-fixes-bug-that-could-have-given-hackers-full-access-to-user-accounts\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/ipsnews.net\/business\/2020\/06\/02\/apple-fixes-bug-that-could-have-given-hackers-full-access-to-user-accounts\/#primaryimage\",\"url\":\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2020\/06\/sign-in-with-apple-800x436.jpg\",\"contentUrl\":\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2020\/06\/sign-in-with-apple-800x436.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/ipsnews.net\/business\/2020\/06\/02\/apple-fixes-bug-that-could-have-given-hackers-full-access-to-user-accounts\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ipsnews.net\/business\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple fixes bug that could have given hackers full access to user accounts\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ipsnews.net\/business\/#website\",\"url\":\"https:\/\/ipsnews.net\/business\/\",\"name\":\"Business\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ipsnews.net\/business\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/ipsnews.net\/business\/#\/schema\/person\/70b05bacee6cf8a877350412fae25e20\",\"name\":\"Bilal\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ipsnews.net\/business\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/01d05f3f41cc0f9ca88d2011a983bb3f2e83e3e92e3532188bf201df38d2aea8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/01d05f3f41cc0f9ca88d2011a983bb3f2e83e3e92e3532188bf201df38d2aea8?s=96&d=mm&r=g\",\"caption\":\"Bilal\"},\"sameAs\":[\"https:\/\/icrowdnewswire.com\/fc\"],\"url\":\"http:\/\/ipsnews.net\/business\/author\/bilal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apple fixes bug that could have given hackers full access to user accounts - Business","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/ipsnews.net\/business\/2020\/06\/02\/apple-fixes-bug-that-could-have-given-hackers-full-access-to-user-accounts\/","og_locale":"en_US","og_type":"article","og_title":"Apple fixes bug that could have given hackers full access to user accounts - Business","og_description":"Report of serious vulnerability lands developer $100,000 bounty. Sign in with Apple&mdash;a privacy-enhancing tool that lets users log into third-party apps without revealing their email addresses&mdash;just fixed a bug that made it possible for attackers to gain unauthorized access to those same accounts. &ldquo;In the month of April, I found a zero-day in Sign in &hellip; Continue reading Apple fixes bug that could have given hackers full access to user accounts Continue Reading &rarr;","og_url":"http:\/\/ipsnews.net\/business\/2020\/06\/02\/apple-fixes-bug-that-could-have-given-hackers-full-access-to-user-accounts\/","og_site_name":"Business","article_published_time":"2020-06-02T11:00:00+00:00","og_image":[{"url":"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2020\/06\/sign-in-with-apple-800x436.jpg","type":"","width":"","height":""}],"author":"Bilal","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bilal","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"http:\/\/ipsnews.net\/business\/2020\/06\/02\/apple-fixes-bug-that-could-have-given-hackers-full-access-to-user-accounts\/","url":"http:\/\/ipsnews.net\/business\/2020\/06\/02\/apple-fixes-bug-that-could-have-given-hackers-full-access-to-user-accounts\/","name":"Apple fixes bug that could have given hackers full access to user accounts - Business","isPartOf":{"@id":"https:\/\/ipsnews.net\/business\/#website"},"primaryImageOfPage":{"@id":"http:\/\/ipsnews.net\/business\/2020\/06\/02\/apple-fixes-bug-that-could-have-given-hackers-full-access-to-user-accounts\/#primaryimage"},"image":{"@id":"http:\/\/ipsnews.net\/business\/2020\/06\/02\/apple-fixes-bug-that-could-have-given-hackers-full-access-to-user-accounts\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2020\/06\/sign-in-with-apple-800x436.jpg","datePublished":"2020-06-02T11:00:00+00:00","author":{"@id":"https:\/\/ipsnews.net\/business\/#\/schema\/person\/70b05bacee6cf8a877350412fae25e20"},"breadcrumb":{"@id":"http:\/\/ipsnews.net\/business\/2020\/06\/02\/apple-fixes-bug-that-could-have-given-hackers-full-access-to-user-accounts\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/ipsnews.net\/business\/2020\/06\/02\/apple-fixes-bug-that-could-have-given-hackers-full-access-to-user-accounts\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/ipsnews.net\/business\/2020\/06\/02\/apple-fixes-bug-that-could-have-given-hackers-full-access-to-user-accounts\/#primaryimage","url":"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2020\/06\/sign-in-with-apple-800x436.jpg","contentUrl":"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2020\/06\/sign-in-with-apple-800x436.jpg"},{"@type":"BreadcrumbList","@id":"http:\/\/ipsnews.net\/business\/2020\/06\/02\/apple-fixes-bug-that-could-have-given-hackers-full-access-to-user-accounts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ipsnews.net\/business\/"},{"@type":"ListItem","position":2,"name":"Apple fixes bug that could have given hackers full access to user accounts"}]},{"@type":"WebSite","@id":"https:\/\/ipsnews.net\/business\/#website","url":"https:\/\/ipsnews.net\/business\/","name":"Business","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ipsnews.net\/business\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/ipsnews.net\/business\/#\/schema\/person\/70b05bacee6cf8a877350412fae25e20","name":"Bilal","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ipsnews.net\/business\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/01d05f3f41cc0f9ca88d2011a983bb3f2e83e3e92e3532188bf201df38d2aea8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/01d05f3f41cc0f9ca88d2011a983bb3f2e83e3e92e3532188bf201df38d2aea8?s=96&d=mm&r=g","caption":"Bilal"},"sameAs":["https:\/\/icrowdnewswire.com\/fc"],"url":"http:\/\/ipsnews.net\/business\/author\/bilal\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"http:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/posts\/18486","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"http:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/comments?post=18486"}],"version-history":[{"count":1,"href":"http:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/posts\/18486\/revisions"}],"predecessor-version":[{"id":18487,"href":"http:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/posts\/18486\/revisions\/18487"}],"wp:attachment":[{"href":"http:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/media?parent=18486"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/categories?post=18486"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/tags?post=18486"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}