Vulnerability in the iOS 8.3 Mail application

A vulnerability in the iOS e-mail client allows an attacker to send messages that can trick the recipients to give the credentials they use to Apple while on malicious websites.mail ios

Vulnerability has already been reported to Apple since January 15, but Jan Soucek, the researcher who discovered it, reports that it has not been repaired in any of the iOS versions released since 8.1.2.

PoC was posted

Apple's mobile operating system, iOS, is now released in the stable 8.3 version, while 8.4 is beta-deployed and only available to registered developers.

For five months Apple has not taken any action to resolve the issue, so the researcher has decided to make public his findings and proof of vulnerability (PoC), in the hope that this will force the company to speed up the repair.

Vulnerability

Researcher Soucek found that the HTML tag is not ignored by the E-mail, κάτι το οποίο μπορεί να αξιοποιηθεί για να αντικαταστήσει το αρχικό περιεχόμενο σε ένα μήνυμα ηλεκτρονικού y with the HTML tags from a remote site under the attacker's control.

In the video he published to prove the exploit's success, he shows that Apple's home page is emerging through malicious messages.

An email message that spoofs the login page can be sent without displaying content from a different web page by using “http-equiv” which provides flexibility and allows the fake login page to be placed in the correct context.

Soucek states that "vulnerabilities can be used for anything that requires HTML tags that are not supported by Mail.app."

A way to protect against such is to enable control two-factor to your Apple ID.

Demonstration of an attack (PoC)

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).