Vulnerability in the iOS 8.3 Mail application

A vulnerability in the iOS e-mail client allows an attacker to send messages that can trick the recipients to give the credentials they use to Apple while on malicious websites.mail ios

The vulnerability has already been reported to Apple since January 15, but Jan Soucek, the researcher who discovered it, says it has not been patched in any of the iOS versions released since 8.1.2.

PoC was posted

Apple's mobile operating system, iOS, is now released in the stable 8.3 version, while 8.4 is beta-deployed and only available to registered developers.

For five months Apple has not taken any action to resolve the issue, so the researcher has decided to make public his findings and proof of vulnerability (PoC), in the hope that this will force the company to speed up the repair.

Vulnerability

Researcher Soucek found that the HTML tag is not ignored by the E-mail application, which can be used to replace the original content in an e-mail with HTML tags from a remote location under the control of the attacker.

In the video he published to prove the exploit's success, he shows that Apple's home page is emerging through malicious messages.

An email that forges the login page can be sent without displaying content from a different webpage using the "http-equiv" feature that provides flexibility and allows the fake login page to be placed in the correct box.

Soucek states that "vulnerabilities can be used for anything that requires HTML tags that are not supported by Mail.app."

One way s from such is to enable control two-factor to your Apple ID.

Demonstration of an attack (PoC)

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).