Apple has paid a bounty hunter $5000 for discovering a security flaw on iCloud. The security flaw is stored in an XSS file on iCloud.com. It allows attackers to embed malicious codes by creating new Pages or Keynotes documents.
The vulnerability belongs to the XSS class and is typically used to deploy payloads on target servers. Once deployed, it is used to steal personal information, including cookies, browser data and much more. Bharad discovered the vulnerability in the Page/Keynotes on an iCloud domain.
In order to trigger the bug, an attacker needed to create new Pages or Keynote content with an XSS payload submitted into the name field.
This content would then need to be saved and either sent or shared with another user. An attacker would then be required to make a change or two to the malicious content, save it again, and then visit “Settings” and “Browser All Versions.”
After clicking on this option, the XSS payload would trigger, the researcher said.
Apple opened up its Bug Bounty program for the public in 2019. The payouts range from $5000 to $250000. Recently, an Indian web developer won $100,000 for discovering a bug in ‘Sign in with Apple’ feature. Last year a group of security researchers hacked Apple for months and found several bugs that could take over victims iCloud account.