{"id":780,"date":"2020-04-04T05:43:55","date_gmt":"2020-04-04T04:43:55","guid":{"rendered":"http:\/\/zerothcode.com\/blog\/?p=780"},"modified":"2020-04-04T05:43:55","modified_gmt":"2020-04-04T04:43:55","slug":"visiting-site-can-hack-iphone","status":"publish","type":"post","link":"https:\/\/zerothcode.com\/blog\/visiting-site-can-hack-iphone\/","title":{"rendered":"How Just Visiting A Site Could Have Hack iPhone or MacBook Camera"},"content":{"rendered":"<p>Hack iPhone : If you use Apple iPhone or MacBook, here we have a piece of alarming news for you.<\/p>\n<p>Turns out merely visiting a website \u2014 not just malicious but also legitimate sites unknowingly loading malicious ads as well<\/p>\n<p>\u2014 using Safari browser could have let remote attackers secretly access your device&#8217;s camera, microphone, or location, and in some cases, saved passwords as well. Hack iPhone<\/p>\n<p>Apple recently paid a $75,000 bounty reward to an ethical hacker,\u00a0Ryan Pickren,<\/p>\n<p>who practically demonstrated the hack and helped the company patch a total of seven new vulnerabilities before any real attacker could take advantage of them.<\/p>\n<p>The fixes were issued in a series of updates to Safari spanning\u00a0versions 13.0.5\u00a0(released January 28, 2020) and\u00a0Safari 13.1 (published March 24, 2020)<\/p>\n<p>&#8220;If the malicious webite wanted camera access, all it had to do was masquerade as a trusted video-conferencing website such as Skype or Zoom,&#8221; Pickren said.<\/p>\n<p>When chained together,<\/p>\n<p>three of the reported Safari flaws could have allowed malicious sites to impersonate any legit site a victim trusts.<\/p>\n<p>and access camera or microphone by abusing the permissions that were otherwise explicitly granted by the victim to the trusted domain only.<\/p>\n<h2>Hack iPhone : An Exploit Chain to Abuse Safari&#8217;s Per-Site Permissions<\/h2>\n<p>Safari browser grants access to certain permissions such as camera, microphone, location, and more on a\u00a0per-website basis.<\/p>\n<p>This makes it easy for individual websites, say Skype, to access the camera without asking for the user&#8217;s permission every time the app is launched.<\/p>\n<p>But there are exceptions to this rule on iOS. While third-party apps must require user&#8217;s explicit consent to access the camera,<\/p>\n<p>Safari can access the camera or the photo gallery without any permission prompts. :Hack iPhone<\/p>\n<p>Specifically, improper access is made possible by leveraging an exploit chain that stringed together multiple flaws in the way the browser\u00a0parsed<\/p>\n<p>URL schemes\u00a0and handled the security settings on a per-website basis. This method only works with websites that are currently open.<\/p>\n<div class=\"separator\">\n<figure style=\"width: 728px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/thehackernews.com\/images\/-4e0sr1W0MQU\/XocHvZ93nXI\/AAAAAAAAALs\/wVrTCkgMrCYdkITLm5-TWUpz9Ze9WwdsgCLcBGAsYHQ\/s728-e100\/hack-iphone-camera.gif\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/thehackernews.com\/images\/-4e0sr1W0MQU\/XocHvZ93nXI\/AAAAAAAAALs\/wVrTCkgMrCYdkITLm5-TWUpz9Ze9WwdsgCLcBGAsYHQ\/s728-e100\/hack-iphone-camera.gif\" alt=\"Hack iPhone\" width=\"728\" height=\"351\" border=\"0\" data-original-height=\"351\" data-original-width=\"728\" \/><\/a><figcaption class=\"wp-caption-text\">Hack iPhone<\/figcaption><\/figure>\n<\/div>\n<h3>\n&#8220;A more important observation was that the URL&#8217;s scheme is completely ignored,&#8221; Pickren noted. :Hack iPhone<\/h3>\n<p>&#8220;This is problematic because some schemes don&#8217;t contain a meaningful hostname at all, such as file:, javascript:, or data:.&#8221;<\/p>\n<p>Put another way, Safari failed to check if the websites adhered to the same-origin policy,<\/p>\n<p>thereby granting access to a different site that shouldn&#8217;t have obtained permissions in the first place.<\/p>\n<p>As a result, a website such as &#8220;https:\/\/example.com&#8221; and its malicious counterpart &#8220;fake:\/\/example.com&#8221; could end up having the same permissions.<\/p>\n<p>Thus, by taking advantage of Safari&#8217;s lazy hostname parsing, it was possible to use a &#8220;file:&#8221; URI<\/p>\n<p>(e.g., file:\/\/\/path\/to\/file\/index.html) to fool the browser into changing the domain name using JavaScript.<\/p>\n<p>&#8220;Safari thinks we are on skype.com, and I can load some evil JavaScript. Camera, Microphone, and Screen Sharing are all compromised when you open my local HTML file,&#8221; Pickren said.<\/p>\n<p>The research found that even plaintext passwords can be stolen this way as Safari uses the same approach to detect websites on which password auto-fill needs to be applied.<\/p>\n<p>Furthermore, auto-download preventions can be bypassed by first opening a trusted site as a pop-up, and subsequently using it to download a malicious file.<\/p>\n<p>Likewise, a &#8220;blob:&#8221; URI (e.g. blob:\/\/skype.com) can be exploited to run arbitrary JavaScript code,<\/p>\n<p>using it to directly access the victim&#8217;s webcam without permission.<\/p>\n<p>In all, the research uncovered seven different zero-day vulnerabilities in Safari \u2014 :Hack iPhone<\/p>\n<ul>\n<li>CVE-2020-3852: A URL scheme may be incorrectly ignored when determining multimedia permission for a website<\/li>\n<li>CVE-2020-3864: A DOM object context may not have had a unique security origin<\/li>\n<li>CVE-2020-3865: A top-level DOM object context may have incorrectly been considered secure<\/li>\n<li>CVE-2020-3885: A file URL may be incorrectly processed<\/li>\n<li>CVE-2020-3887: A download&#8217;s origin may be incorrectly associated<\/li>\n<li>CVE-2020-9784: A malicious iframe may use another website&#8217;s download settings<\/li>\n<li>CVE-2020-9787: A URL scheme containing dash (-) and period (.) adjacent to each other is incorrectly ignored when determining multimedia permission for a website<\/li>\n<\/ul>\n<p>If you are a Safari user, it&#8217;s recommended that you keep the browser up-to-date and ensure websites are granted access<\/p>\n<p>to only those settings which are essential for them to function. : Hack iPhone<\/p>\n<p>You May Like to Read:<\/p>\n<p><a href=\"http:\/\/zerothcode.com\/blog\/wi-fi-vulnerability-affects-billion\/\">http:\/\/zerothcode.com\/blog\/wi-fi-vulnerability-affects-billion\/<\/a><\/p>\n<p><a href=\"http:\/\/zerothcode.com\/blog\/hacking-magecart-inject-skimmers\/\">http:\/\/zerothcode.com\/blog\/hacking-magecart-inject-skimmers\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hack iPhone : If you use Apple iPhone or MacBook, here we have a piece of alarming news for you.<\/p>\n","protected":false},"author":1,"featured_media":781,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[37],"tags":[],"yst_prominent_words":[238,984,988,995,985,997,986,991,1002,1001,994,321,996,983,998,992,987,989,990,993],"class_list":["post-780","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hackers-news"],"_links":{"self":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/780","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/comments?post=780"}],"version-history":[{"count":0,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/780\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/media\/781"}],"wp:attachment":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/media?parent=780"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/categories?post=780"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/tags?post=780"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/yst_prominent_words?post=780"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}