Document Title: =============== Apple Consultants - Client Side Cross Site Vulnerability References (Source): ==================== http://www.vulnerability-lab.com/get_content.php?id=1533 Apple ID: 624519287 Release Date: ============= 2015-08-11 Vulnerability Laboratory ID (VL-ID): ==================================== 1533 Common Vulnerability Scoring System: ==================================== 3.3 Product & Service Introduction: =============================== Apple Inc. is an American multinational technology company headquartered in Cupertino, California, that designs, develops, and sells consumer electronics, computer software, online services, and personal computers. Its best-known hardware products are the Mac line of computers, the iPod media player, the iPhone smartphone, the iPad tablet computer, and the Apple Watch smartwatch. Its online services include iCloud, the iTunes Store, and the App Store. Apple`s consumer software includes the OS X and iOS operating systems, the iTunes media browser, the Safari web browser, and the iLife and iWork creativity and productivity suites. (Copy of the Homepage: https://en.wikipedia.org/?title=Apple_Inc. ) Abstract Advisory Information: ============================== The Vulnerability Laboratory Research Team discovered an client-side input validation web vulnerability in the official Apple Consultants online-service web-application. Vulnerability Disclosure Timeline: ================================== 2015-06-20: Researcher Notification & Coordination (Benjamin Kunz Mejri) 2015-06-22: Vendor Notification 1 (Apple Product Security Team) 2015-07-12: Vendor Response/Feedback (Apple Product Security Team) 2015-08-06: Vendor Fix/Patch (Apple Developer Team - Cupertino) 2015-08-12: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== Apple Product: Apple Consultants - Online Service (Web-Application) 2015 Q2 Exploitation Technique: ======================= Remote Severity Level: =============== Low Technical Details & Description: ================================ A non-persistent input validation web vulnerability has been discovered in the official Apple Consultants online-service web-application. The security vulnerability allows remote attackers to manipulate client-side application to browser requests to compromise user or admin session information. The vulnerability is located in the `q` value of the apple consultants `geocode` online-service module. Remote attackers are able to inject malicious script codes to client-side application requests. Remote attackers are able to prepare special crafted weblinks to execute client-side script code that compromises the apple user/admin session data. The execution of the script code occurs in the geocode module of the apple consultants website. The injection point of the issue is the vulnerable `q` value. The attack vector of the vulnerability is located on the client-side of the online-service and the request method to inject or execute the code is GET. There is no secure validation that filters or blocks the entries of the vulnerable input fields. neither the firewall or basic web-server validation blocks to inject client-side script codes. The security risk of the non-persistent cross site vulnerability is estimated as medium with a cvss (common vulnerability scoring system) count of 3.3. Exploitation of the non-persistent cross site scripting web vulnerability requires no privilege web application user account and low user interaction. Successful exploitation of the vulnerability results in session hijacking, non-persistent phishing, non-persistent external redirects, non-persistent load of malicious script codes or non-persistent web module context manipulation. Request Method(s): [+] GET Vulnerable Service(s): [+] Apple Consultants (API) Vulnerable Module(s): [+] geocode Vulnerable Parameter(s): [+] q Proof of Concept (PoC): ======================= The client-side cross site scripting web vulnerability can be exploited by remote attackers without privilege application user account and with low or medium user interaction. For security demonstration or to reproduce the security vulnerability follow the provided information and steps below to continue. PoC: Location GEO