Indian Developer Grabs $100,000 For Reporting ‘Sign in with Apple’ Flaw

Indian Developer Grabs $100,000 For Reporting ‘Sign in with Apple’ Flaw

Sign in with Apple is similar to other app login options such as “Sign in with Google” or Facebook; however, the difference is that Apple’s single sign-on offering is more private and even allows users to mask their email ID.


But Apple’s login method was hoarding a severe zero-day vulnerability that could have resulted in hackers taking over user accounts.

The bug was spotted back in April by an Indian developer, Bhavuk Jain, for which he received a whopping $100,000 in bug bounty. Thankfully, Apple has patched the vulnerability and says no accounts have been compromised.


According to Jain, the bug was specific to third-party apps, i.e., it only affected people who tried using “Sign in with Apple” in a third-party app.


Jain explains in his blogpost that the Apple login method authenticates a user either via JWT (JSON Web Token) or a code generated by Apple’s server. However, Jain noted that attackers could have forged a token linked to any email and could have verified it using Apple’s public key.


If the bug hadn’t been discovered, a hacker could have enjoyed a “full account takeover” despite a user masking their email.



The impact of this vulnerability was quite critical as it could have allowed a full account takeover. Many developers have integrated Sign in with Apple since it is mandatory for applications that support other social logins. To name a few that use Sign in with Apple – Dropbox, Spotify, Airbnb, Giphy, Jain told The Hacker news



Apple int ..

Support the originator by clicking the read the rest link below.