Now Reading
Apple's search bot leaked internal IP

Apple's search bot leaked internal IP

A security researcher has discovered that Apple search bots that detected its podcast series leaked internal IPs due to an incorrectly configured proxy server.

Screenshot 2020 11 05 Apple search bot leaked internal IPs via proxy configuration - The Apple search bot leaked internal IP

For its part, Apple took a little over 9 months to fix this leak, for no apparent reason.

Applebot refers to Apple's web crawler that scans the web to find content for its users.

"Applebot is the web crawler for Apple. "Products like Siri and Spotlight Suggestions use Applebot," according to Apple.

Last month, security researcher and podcast creator David Coomber discovered that Applebot had used a proxy that leaked Apple's internal IP addresses.

A sample request made on the Coomber website contained both headers that revealed the internal IP address of the device behind the proxy server.

17.XXX “HEAD /mixes/podcast.jpg HTTP / 1.1” 301 “iTMS” “1.1 pv50XXX.apple.com (proxy product)” “XXX12”

The fields listed are the external IP address of the proxy server, the requested path, the HTTP response code, the web browser user agent information, and the Via and X-Forwarded-For header values.

Although I've seen some bots that were not set up properly, I was surprised to see Apple's Podcast bot looking for updates on my podcast (Deep House Mixes) using a proxy that displayed internal IPs and hostnames from "Via" , ”X - Forwarded-For”.

Read them Technology News from all over the world, with the validity of iGuRu.gr

Follow us on Google News

View Comments (0)

Leave a Reply

Your email address Will not be published.


iGuRu.gr © 2012 - 2020 Keep it Simple Stupid Custom Theme

Scroll To Top