Document Title: =============== Apple iTunes U - Persistent POST Inject Web Vulnerability Date: ===== 2015-08-11 References: =========== http://www.vulnerability-lab.com/get_content.php?id=1532 Apple ID: 624515538 VL-ID: ===== 1532 Common Vulnerability Scoring System: ==================================== 3.7 Introduction: ============= Apple Inc. is an American multinational technology company headquartered in Cupertino, California, that designs, develops, and sells consumer electronics, computer software, online services, and personal computers. Its best-known hardware products are the Mac line of computers, the iPod media player, the iPhone smartphone, the iPad tablet computer, and the Apple Watch smartwatch. Its online services include iCloud, the iTunes Store, and the App Store. Apple`s consumer software includes the OS X and iOS operating systems, the iTunes media browser, the Safari web browser, and the iLife and iWork creativity and productivity suites. (Copy of the Homepage: https://en.wikipedia.org/?title=Apple_Inc. ) Abstract: ========= The Vulnerability Laboratory Research Team discovered an application-side input validation web vulnerability in the official Apple iTunes U online-service web-application. Report-Timeline: ================ 2015-06-21: Researcher Notification & Coordination (Benjamin Kunz Mejri) 2015-06-22: Vendor Notification 1 (Apple Product Security Team) 2015-08-11: Public Disclosure (Vulnerability Laboratory) Status: ======== Published Affected Products: ================== Apple Product: iTunes U - Courses (Web-Application) v2015 Q2 Exploitation-Technique: ======================= Remote Severity: ========= Medium Details: ======== An application-side input validation web vulnerability and filter bypass has been discovered in the official Apple iTunes U web-application. The vulnerability allows remote attackers to inject own malicious script code on the application-side of the vulnerable online-service or module. The vulnerability is located in the firstname input field of the vulnerable `Sent iTunes U & Courses` module. Remote attackers with low privilege application user account are able to inject own malicious script codes on the application-side of the notify email service. The injection point is the vulnerable firstname input of the iTunes U send module. The execution point is the `Sent iTunes U & Courses` mail with the malicious injected script code in the firstname value. The attack vector is application-side and the request method to inject the script code is POST. The security risk of the filter bypass and application-side input validation web vulnerability is estimated as medium with a cvss (common vulnerability scoring system) count of 3.7. Exploitation of the persistent web vulnerability requires a low privilege web application user account and low user interaction. Successful exploitation of the vulnerability results in session hijacking, persistent phishing, persistent external redirects, persistent load of malicous script codes or persistent web module context manipulation. Request Method(s): [+] POST Vulnerable Module(s): [+] Apple - iTunes U Vulnerable Parameter(s): [+] Firstname Affected Module(s): [+] Sent iTunes U & Courses Proof of Concept: ================= The application-side input validation web vulnerability can be exploited by remote attackers with low privilege application user account and without user interaction. For security demonstration or to reproduce the security vulnerability follow the provided information and steps below to continue. Manual steps to reproduce the vulnerability ... 1. Register an iTunes U account or apple account to login 2. Inject in the registration procedure to the firstname own malicious test script codes 3. Save the entry by sending it via mail to another user 4. Check the inbox and watch the header were the script code is wrong encoded and executes 5. Successful reproduce of the security vulnerability! Payload(s): course

PenTestBySamir

PoC: Sent iTunes U & Courses - Mail

Dear iTunes U Instructor,

"> "> sent you a copy of the course

tested by Samir

. Sign in to iTunes U Course Manager to accept the course.

--- PoC Session Logs [POST] --- 12:48:43.599[462ms][total 462ms] Status: 201[Apple WebObjects] POST https://p2-u.itunes.apple.com/WebObjects/LZTeacher.woa/ra/courses/COIZADYCBHFN33ZI/copy Load Flags[LOAD_BYPASS_CACHE LOAD_BACKGROUND ] Content Size[0] Mime Type[application/x-unknown-content-type] Request Headers: Host[p2-u.itunes.apple.com] User-Agent[Mozilla/5.0 (X11; Linux i686; rv:18.0) Gecko/20100101 Firefox/18.0] Accept[text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8] Accept-Language[en-US,en;q=0.5] Accept-Encoding[gzip, deflate] Content-Type[application/json; charset=UTF-8] Referer[https://itunesu.itunes.apple.com/coursemanager/] Content-Length[29] Origin[https://itunesu.itunes.apple.com] Cookie[s_fid=778580A733D05D42-3C8CF517C4375090; s_vnum_n2_us=4%7C4%2C5%7C1%2C18%7C1%2C0%7C4%2C3%7C1%2C7%7C1%2C99%7C1%2C35%7C1%2C43%7C1; POD=us~en; searchTermState=search; dssf=1; as_sfa=us; pxro=1; accs=d; ac_DocumentTypeFilterindex=0; ac_Productindex=0; ac_DocumentTypeFilterValues=0; ac_search=/%5C%22/%3E%3Cimg%20arc/%5C%22/x/%5C%22/%3E; ac_IsSearchHomePage=0; s_vnum_n2_it=4%7C1; dslang=US-EN; ds01_a=60591365e36a87b1aa8db2fbe3cdd5847bdef7e8f1a5c4a20a96c8691fd6de2672ff17e652989fbf12f4ec482d1e2bea290cc0a699594dbdb47c25842da52a14ed6dd41274e6702d0b1e0db5f648d6e00db3e44053d3466c752f9811e4371384GZVX; s_vi=[CS]v1|2AC3C55A05010A45-60000108E0012008[CE]; lzhasloggedin=yes; lzHasSeenSplashScreen=yes; lzauth=1a7b78a2669f597f6164aad4466cb372] Connection[keep-alive] Pragma[no-cache] Cache-Control[no-cache] Post Data: {"appleId":"s-dz@hotmail.fr"}[] Response Headers: x-apple-jingle-correlation-key[GHR5SO74CRCARIJBB7SWHYZRSY] x-apple-application-site[ST11] access-control-allow-origin[https://itunesu.itunes.apple.com] Strict-Transport-Security[max-age=31536000] x-apple-course-last-modified[1434967967000] Date[Mon, 22 Jun 2015 11:50:47 GMT] Set-Cookie[lzhasloggedin=yes; version="1"; expires=Wed, 22-Jul-2015 11:50:47 GMT; path=/; domain=.itunes.apple.com lzauth=1a7b78a2669f597f6164aad4466cb372; version="1"; path=/; domain=.itunes.apple.com; secure; HttpOnly] apple-timing-app[269 ms] Cache-Control[no-cache, no-store] Access-Control-Expose-Headers[x-apple-course-last-modified] x-apple-application-instance[207] x-webobjects-loadaverage[1] access-control-allow-credentials[true] Connection[keep-alive] Content-Length[0] Reference(s): https://itunesu.itunes.apple.com http://www.apple.com/education/ipad/itunes-u/ https://p2-u.itunes.apple.com/WebObjects/LZTeacher.woa/ra/courses/ Solution: ========= The vulnerability can be patched by a secure parse and encode of the vulnerable firstname value in the itunes u module. Restrict the input and disallow usage of special chars. Setup an own secure exception to prevent malicious input execution. Encode and filter the mail header with the body context of the stored firstname value in the database management system. Risk: ===== The security risk of the application-side input validation web vulnerability in the apple itunes u online-service is estimated as medium. (CVSS 3.7) Credits: ======== Vulnerability Laboratory [Research Team] - Hadji Samir [samir@evolution-sec.com] Disclaimer: =========== The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. We do not approve or encourage anybody to break any vendor licenses, policies, deface websites, hack into databases or trade with fraud/stolen material. Domains: www.vulnerability-lab.com - www.vuln-lab.com - www.evolution-sec.com Contact: admin@vulnerability-lab.com - research@vulnerability-lab.com - admin@evolution-sec.com Section: magazine.vulnerability-db.com - vulnerability-lab.com/contact.php - evolution-sec.com/contact Social: twitter.com/#!/vuln_lab - facebook.com/VulnerabilityLab - youtube.com/user/vulnerability0lab Feeds: vulnerability-lab.com/rss/rss.php - vulnerability-lab.com/rss/rss_upcoming.php - vulnerability-lab.com/rss/rss_news.php Programs: vulnerability-lab.com/submit.php - vulnerability-lab.com/list-of-bug-bounty-programs.php - vulnerability-lab.com/register/ Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), modify, use or edit our material contact (admin@vulnerability-lab.com or research@vulnerability-lab.com) to get a permission. Copyright © 2015 | Vulnerability Laboratory - [Evolution Security GmbH]™