Rocksolid Light

News from da outaworlds

mail  files  register  groups  login

Message-ID:  

Nothing so needs reforming as other people's habits. -- Mark Twain


comp / comp.mobile.ipad / Re: Almost every iOS & macOS app has had huge vulnerabilities for over a decade

SubjectAuthor
* Almost every iOS & macOS app has had huge vulnerabilities for over a decadePeter
`* Re: Almost every iOS & macOS app has had huge vulnerabilities for over a decadeChris
 `* Re: Almost every iOS & macOS app has had huge vulnerabilities for over a decadeJolly Roger
  `* Re: Almost every iOS & macOS app has had huge vulnerabilities for over a decadedavid
   +- Re: Almost every iOS & macOS app has had huge vulnerabilities for over a decadeJolly Roger
   `- Re: Almost every iOS & macOS app has had huge vulnerabilities for over a decadeChris

1
Subject: Almost every iOS & macOS app has had huge vulnerabilities for over a decade
From: Peter
Newsgroups: misc.phone.mobile.iphone, comp.sys.mac.system, uk.telecom.mobile, comp.mobile.ipad
Organization: -
Date: Wed, 3 Jul 2024 05:38 UTC
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: confused@nospam.net (Peter)
Newsgroups: misc.phone.mobile.iphone,comp.sys.mac.system,uk.telecom.mobile,comp.mobile.ipad
Subject: Almost every iOS & macOS app has had huge vulnerabilities for over a decade
Date: Wed, 3 Jul 2024 06:38:38 +0100
Organization: -
Lines: 111
Message-ID: <v62o4t$22b9c$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 03 Jul 2024 07:38:38 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="8bee8f85c8102c44ba79eb2024792999";
logging-data="2174252"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19EcLS6adfGzdCucdUcSMrJ"
Cancel-Lock: sha1:C5yUjERvT2l5ex2yXnGQB0APG/0=
X-Newsreader: Forte Agent 3.3/32.846
X-No-Archive: yes
View all headers

A near inconceivable number of Apple iPhone & macOS apps have been exposed
to critical vulnerabilities in a popular dependency manager for over 10
Years such that over three million CocoaPods-built iOS and macOS apps have
been vulnerable for over a decade, unbeknownst to Apple & its test teams.
The CocoaPods platform contained a trio of serious exploited iOS and macOS
vulnerabilities. The most severe of them - CVE-2024-38366, a remote code
execution (RCE) opportunity - was assigned a critical 10 out of 10 CVSS
rating. Another remarkable bug, CVE-2024-38368, earned a critical 9.3, and
an 8.2 was given to the session verification-hijacking issue CVE-2024-38367
- just to name a few of the vulnerabilites that slipped right by Apple
testing for more than a decade as if Apple testers are as blind as a bat.

"The impact of this is enormous," says E.V.A CEO and co-founder Alon
Boxiner. "You can't describe it in words. We don't even know how to
accumulate the numbers [of affected apps] because of CocoaPods' vast
usage."

The CocoaPods dependency manager is found in over a hundred thousand
libraries used in more than three million mobile apps on iOS & macOS.

CocoaPods facilitates the integration of third-party code into programs by
providing open-source libraries. When a library is updated, apps that use
it automatically receive the most recent updates.

CocoaPods is a platform that developers in Apple's ecosystem use to add and
manage external libraries (called "pods"). It sports over a hundred
thousand libraries used by more than three million apps, including the most
popular ones in the world such as packages relating to Instagram, X, Slack,
AirBnB, Tinder, and Uber, to name just a few. This makes the pods prime
targets for hackers, and the CocoaPods platform a bona fide money pit given
Apple never thought to test for this vulnerability in more than a decade.

The exploit gives hackers instant access to private content, credit card
numbers, medical records, and other sensitive app data. The information is
then exploited for ransomware, fraud, blackmail, corporate espionage, and
other nefarious activities.

The weaknesses are associated with an unreliable email verification system
that verifies the identity of developers for specific pods or libraries.

The vulnerabilities allowed any malicious actor to insert malicious code
into many of the most popular iOS and MacOS applications.

An attacker using the vulnerabilities could easily have infected almost
every Apple device, leaving tens of thousands of organizations vulnerable
to catastrophic financial and reputational damage. One vulnerability
detailed by E.V.A's researchers could enabled zero-day attacks against
supposedly secure macOS infrastructure (which was insecure for a decade).

CocoaPods was first developed and released in 2011. Its current woes can be
traced to 2014, when it replaced a GitHub-based authentication system with
a new "Trunk" server, which thereafter doubled as the platform's
centralized repository and distribution platform.

Though Trunk promised benefits to security, scalability, and developer
quality of life, the migration process was awkward. For example,
shockingly, ownership over all pods was reset.

"As part of the integration, some API's were exposed - including a
front-end Web page - to let business owners that were authenticated via
their GitHub account claim their own pods," recalls Reef Spektor, E.V.A
vice president of research. In other words, users reclaimed their pods by
simply calling dibs.

Many authors didn't reclaim their pods at all. Thousands of dependencies
were left "orphaned." Over time still more were abandoned, as authors
reneged on their ownership. Thousands of pods remain ownerless today.

The rub? The public API endpoint for claiming pods was still available nine
years later.

Anyone in possession of this knowledge could have, at any point from 2014
to 2023, claimed anyone else's pod for themselves, modified it however they
wished, and pushed that modification to any Apple apps that use it.

What reasonable app would rely on an abandoned pod? It turns out: many,
sometimes without noticing simply because it's a dependency of yet another
pod. E.V.A found evidence of orphaned pods in documentation for apps like
Facebook, Safari, Microsoft Teams, TikTok, Snapchat, and many more.

Remarkably, this wasn't even the most severe bug they found, which proved
many times over how poorly Apple handles the testing of their own products.

Max-Severity RCE Bug Tied to RubyGem
Ironically, CocoaPods' worst vulnerability lay with an open source
component it incorporated back in 2014 for validating user email addresses.

Thanks to some vulnerable methods in the RubyGem package rfc-22, an
attacker could have injected arbitrary malicious code into the address
field during Trunk's account validation process. The server would
unknowingly run their arbitrary code, granting them carte blanche.

At this stage, Spektor explains, "I have complete access to the Trunk
service - every owner, every pod, unclaimed, claimed, it doesn't really
matter. I can take full ownership over them if I want to, I can edit them
at runtime. So, for example, someone publishes a pod, and in the server I
can hook to the pod specification and alter it to add malicious code. And
that wouldn't really be visible externally."

The type of malicious code such an attacker could silently add to a pod
would be limitless, and this is just one way they could take advantage of
such access. They could use such access to shut down Trunk entirely, or
steal session tokens from pod owners or CocoaPods itself.

https://www.techtimes.com/articles/306292/20240703/iphone-mac-applications-exposed-cyberattacks-10-years-report-claims.htm
https://siliconangle.com/2024/07/02/decade-long-cocoapods-vulnerabilities-exposed-apple-users-potential-security-risks/
https://www.darkreading.com/cloud-security/apple-cocoapods-bugs-expose-apps-code-injection
https://www.theregister.com/2024/07/02/cocoapods_vulns_supply_chain_potential/

Subject: Re: Almost every iOS & macOS app has had huge vulnerabilities for over a decade
From: Chris
Newsgroups: uk.telecom.mobile, misc.phone.mobile.iphone, comp.sys.mac.system, comp.mobile.ipad
Organization: A noiseless patient Spider
Date: Wed, 3 Jul 2024 07:11 UTC
References: 1
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: ithinkiam@gmail.com (Chris)
Newsgroups: uk.telecom.mobile,misc.phone.mobile.iphone,comp.sys.mac.system,comp.mobile.ipad
Subject: Re: Almost every iOS & macOS app has had huge
vulnerabilities for over a decade
Date: Wed, 3 Jul 2024 07:11:48 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 16
Message-ID: <v62tjk$239lb$1@dont-email.me>
References: <v62o4t$22b9c$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 03 Jul 2024 09:11:48 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="4888872de617c7c30132c9ac02eabe09";
logging-data="2205355"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/ZEtnxLG/sl8gJcjGLeWTGMRHXzUbLRTw="
User-Agent: NewsTap/5.5 (iPhone/iPod Touch)
Cancel-Lock: sha1:8JNvChAUUbJ5gIlFA3/1dJVwWwQ=
sha1:R3JiZN+X8S+L0felUiNTJ4NrJyQ=
View all headers

Peter <confused@nospam.net> wrote:
> A near inconceivable number of Apple iPhone & macOS apps have been exposed
> to critical vulnerabilities in a popular dependency manager for over 10
> Years such that over three million CocoaPods-built iOS and macOS apps have
> been vulnerable for over a decade, unbeknownst to Apple & its test teams.

This is very concerning, however the bit you omitted is that these
vulnerabilities were patched late last year.

The most important thing people can do is keep their apps and iOS up to
date. And maybe reconsider using apps that haven't been updated since
October 2023.

It's also worth mentioning that this was a vulnerability explicitly
possible because of the open source model. Had CocoaPods not been available
on github it would have been possible to exploit as easily or at all.

Subject: Re: Almost every iOS & macOS app has had huge vulnerabilities for over a decade
From: Jolly Roger
Newsgroups: uk.telecom.mobile, misc.phone.mobile.iphone, comp.sys.mac.system, comp.mobile.ipad
Organization: People for the Ethical Treatment of Pirates
Date: Wed, 3 Jul 2024 15:46 UTC
References: 1 2
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: jollyroger@pobox.com (Jolly Roger)
Newsgroups: uk.telecom.mobile,misc.phone.mobile.iphone,comp.sys.mac.system,comp.mobile.ipad
Subject: Re: Almost every iOS & macOS app has had huge vulnerabilities for
over a decade
Date: 3 Jul 2024 15:46:32 GMT
Organization: People for the Ethical Treatment of Pirates
Lines: 27
Message-ID: <lela2oF7jrrU1@mid.individual.net>
References: <v62o4t$22b9c$1@dont-email.me> <v62tjk$239lb$1@dont-email.me>
X-Trace: individual.net xCv+xwwDUFgFgsIUsHg+2geeuBkdid3aMwym9MW28OXVN5Zlnn
Cancel-Lock: sha1:zCAd2/UZ6XD88+SkZtTYMDATKE8= sha256:1inmPrQs/PmfIAXUhq04raMtAMig0uVySkMIvcinhXE=
Mail-Copies-To: nobody
X-Face: _.g>n!a$f3/H3jA]>9pN55*5<`}Tud57>1<n@LQ!aZ7vLO_nWbK~@T'XIS0,oAJcU.qLM
dk/j8Udo?O"o9B9Jyx+ez2:B<nx(k3EdHnTvB]'eoVaR495,Rv~/vPa[e^JI+^h5Zk*i`Q;ezqDW<
ZFs6kmAJWZjOH\8[$$7jm,Ogw3C_%QM'|H6nygNGhhl+@}n30Nz(^vWo@h>Y%b|b-Y~()~\t,LZ3e
up1/bO{=-)
User-Agent: slrn/1.0.3 (Darwin)
View all headers

On 2024-07-03, Chris <ithinkiam@gmail.com> wrote:
> Peter <confused@nospam.net> wrote:
>> A near inconceivable number of Apple iPhone & macOS apps have been
>> exposed to critical vulnerabilities in a popular dependency manager
>> for over 10 Years such that over three million CocoaPods-built iOS
>> and macOS apps have been vulnerable for over a decade, unbeknownst to
>> Apple & its test teams.
>
> This is very concerning, however the bit you omitted is that these
> vulnerabilities were patched late last year.
>
> The most important thing people can do is keep their apps and iOS up
> to date. And maybe reconsider using apps that haven't been updated
> since October 2023.
>
> It's also worth mentioning that this was a vulnerability explicitly
> possible because of the open source model. Had CocoaPods not been
> available on github it would have been possible to exploit as easily
> or at all.

Such level-headed nuance is to be ignored, because: troll.

--
E-mail sent to this address may be devoured by my ravenous SPAM filter.
I often ignore posts from Google. Use a real news client instead.

JR

Subject: Re: Almost every iOS & macOS app has had huge vulnerabilities for over a decade
From: david
Newsgroups: uk.telecom.mobile, misc.phone.mobile.iphone, comp.sys.mac.system, comp.mobile.ipad
Organization: i2pn2 (i2pn.org)
Date: Wed, 3 Jul 2024 16:00 UTC
References: 1 2 3
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!news.quux.org!news.nk.ca!rocksolid2!i2pn2.org!.POSTED!not-for-mail
From: this@is.invalid (david)
Newsgroups: uk.telecom.mobile,misc.phone.mobile.iphone,comp.sys.mac.system,comp.mobile.ipad
Subject: Re: Almost every iOS & macOS app has had huge vulnerabilities for over a decade
Date: Wed, 3 Jul 2024 10:00:22 -0600
Organization: i2pn2 (i2pn.org)
Message-ID: <4b7bf52ce3b0f86d711d0e112f27bb30486e34d3@i2pn2.org>
References: <v62o4t$22b9c$1@dont-email.me> <v62tjk$239lb$1@dont-email.me> <lela2oF7jrrU1@mid.individual.net>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 3 Jul 2024 16:00:22 -0000 (UTC)
Injection-Info: i2pn2.org;
logging-data="2032613"; mail-complaints-to="usenet@i2pn2.org";
posting-account="CaHBDtkhV1D5Bt+NHXWn2/AL80wOBYc5Yj9RDiDOZCs";
User-Agent: Unison/2.1.10
X-Spam-Checker-Version: SpamAssassin 4.0.0
View all headers

Using <news:lela2oF7jrrU1@mid.individual.net>, Jolly Roger wrote:

> Such level-headed nuance is to be ignored

Except that he was wrong and even if he had been correct for you to advise
vulnerabilities in open source code should be ignored is just plain stupid.

Subject: Re: Almost every iOS & macOS app has had huge vulnerabilities for over a decade
From: Jolly Roger
Newsgroups: uk.telecom.mobile, misc.phone.mobile.iphone, comp.sys.mac.system, comp.mobile.ipad
Organization: People for the Ethical Treatment of Pirates
Date: Wed, 3 Jul 2024 18:30 UTC
References: 1 2 3 4
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: jollyroger@pobox.com (Jolly Roger)
Newsgroups: uk.telecom.mobile,misc.phone.mobile.iphone,comp.sys.mac.system,comp.mobile.ipad
Subject: Re: Almost every iOS & macOS app has had huge vulnerabilities for
over a decade
Date: 3 Jul 2024 18:30:47 GMT
Organization: People for the Ethical Treatment of Pirates
Lines: 28
Message-ID: <leljmnF91g3U1@mid.individual.net>
References: <v62o4t$22b9c$1@dont-email.me> <v62tjk$239lb$1@dont-email.me>
<lela2oF7jrrU1@mid.individual.net>
<4b7bf52ce3b0f86d711d0e112f27bb30486e34d3@i2pn2.org>
X-Trace: individual.net 9n+jDN/8MygP8wvE1lxOIgR3ZTvOJicxrZvTwUMLk656f7/ouI
Cancel-Lock: sha1:jQPPOiGc2QqkFBjpIvmutdlPe9Q= sha256:dDyzagP+0La9VurNi5hL69JsA1RUAxeR0ganh2ByvlA=
Mail-Copies-To: nobody
X-Face: _.g>n!a$f3/H3jA]>9pN55*5<`}Tud57>1<n@LQ!aZ7vLO_nWbK~@T'XIS0,oAJcU.qLM
dk/j8Udo?O"o9B9Jyx+ez2:B<nx(k3EdHnTvB]'eoVaR495,Rv~/vPa[e^JI+^h5Zk*i`Q;ezqDW<
ZFs6kmAJWZjOH\8[$$7jm,Ogw3C_%QM'|H6nygNGhhl+@}n30Nz(^vWo@h>Y%b|b-Y~()~\t,LZ3e
up1/bO{=-)
User-Agent: slrn/1.0.3 (Darwin)
View all headers

On 2024-07-03, david <this@is.invalid> wrote:
> Using <news:lela2oF7jrrU1@mid.individual.net>, Jolly Roger wrote:
>
>> Such level-headed nuance is to be ignored
>
> Except that he was wrong

Nothing he said is wrong, and the fact that you trimmed what he said
from your reply shows what a cowardly troll you are, little Arlen.

> and even if he had been correct

He is correct.

> for you to advise vulnerabilities in open source code should be
> ignored

Yet again, you lie - I never said that, which is a matter of record.

> is just plain stupid.

Projection from a stupid zealot.

--
E-mail sent to this address may be devoured by my ravenous SPAM filter.
I often ignore posts from Google. Use a real news client instead.

JR

Subject: Re: Almost every iOS & macOS app has had huge vulnerabilities for over a decade
From: Chris
Newsgroups: uk.telecom.mobile, misc.phone.mobile.iphone, comp.sys.mac.system, comp.mobile.ipad
Organization: A noiseless patient Spider
Date: Wed, 3 Jul 2024 18:31 UTC
References: 1 2 3 4
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: ithinkiam@gmail.com (Chris)
Newsgroups: uk.telecom.mobile,misc.phone.mobile.iphone,comp.sys.mac.system,comp.mobile.ipad
Subject: Re: Almost every iOS & macOS app has had huge
vulnerabilities for over a decade
Date: Wed, 3 Jul 2024 18:31:19 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 14
Message-ID: <v645dn$2aav3$1@dont-email.me>
References: <v62o4t$22b9c$1@dont-email.me>
<v62tjk$239lb$1@dont-email.me>
<lela2oF7jrrU1@mid.individual.net>
<4b7bf52ce3b0f86d711d0e112f27bb30486e34d3@i2pn2.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 03 Jul 2024 20:31:20 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="4888872de617c7c30132c9ac02eabe09";
logging-data="2436067"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+SLjgE7DkoM+1A/ruEHBEVG9oUM8BmFCY="
User-Agent: NewsTap/5.5 (iPhone/iPod Touch)
Cancel-Lock: sha1:sYjTaY4uAhtiQIJrRWLcUKKk7n8=
sha1:jXeAUCYR46dz0XFxuUda53oYPYI=
View all headers

david <this@is.invalid> wrote:
> Using <news:lela2oF7jrrU1@mid.individual.net>, Jolly Roger wrote:
>
>> Such level-headed nuance is to be ignored
>
> Except that he was wrong

Who was wrong?

> and even if he had been correct for you to advise
> vulnerabilities in open source code should be ignored is just plain stupid.

no-one has suggested that.

1

rocksolid light 0.9.8
clearnet tor