CVE-2 0 1 6-1 7 7 9 technical analysis and the story behind it-vulnerability warning-the black bar safety net

2016-04-20T00:00:00
ID MYHACK58:62201673798
Type myhack58
Reporter xisigr
Modified 2016-04-20T00:00:00

Description

The Geolocation API is used to obtain the user's host device's location, and it has a complete protection of user privacy mechanisms. But the CVE-2 0 1 6-1 7 7 6 this vulnerability to bypass the Geolocation authentication of the source of a security mechanism, and it is possible to cause the user to privacy leakage. This article in the analysis of the CVE-2 0 1 6-1 7 7 9 vulnerability causes on the basis of explored the Geolocation privacy mechanism, which is interspersed with the acquisition of Apple's location and the“story”on the user privacy is more of an alert.

0x01 CVE-2 0 1 6-1 7 7 6

In IOS, Geolocation authentication is by a UIWebView to do the processing, an attacker can bypass the same origin policy so that the authentication block in any domain POPs up, and when the user clicks on the Allow access to user's location. In the IOS platform, Safari and Chrome are affected by this vulnerability.

Affected products: WebKit in Apple iOS < 9.3 and Safari < 9.1, Chrome

Vulnerability fix date: 2016/3/21

Vulnerability announcement:

<https://support.apple.com/HT206166>

<https://support.apple.com/HT206171>

<http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html>

<http://lists.apple.com/archives/security-announce/2016/Mar/msg00005.html>

[1] [2] [3] [4] [5] [6] [7] next