{"id":18077,"date":"2022-02-02T10:49:39","date_gmt":"2022-02-02T18:49:39","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/02\/02\/news-11810\/"},"modified":"2022-02-02T10:49:39","modified_gmt":"2022-02-02T18:49:39","slug":"news-11810","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/02\/02\/news-11810\/","title":{"rendered":"A Bug in iOS 15 Is Leaking User Browsing Activity in Real Time"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/61e731353e654a13e9a16fc8\/master\/pass\/Security-iOS-15-Leak-107178697.jpg\"\/><\/p>\n<p><strong>Credit to Author: Dan Goodin, Ars Technica| Date: Wed, 19 Jan 2022 18:15:00 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-iiTsTb hAGfXd byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb UCAzg byline__name\"><a class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA BylineLink-eZnyPI eTiIvU mEZDb fNdcwQ bKZMMS byline__name-link button\" href=\"\/author\/dan-goodin-ars-technica\">Dan Goodin, Ars Technica<\/a><\/span><\/span><\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p><span class=\"lead-in-text-callout\">For the past<\/span> four months, Apple\u2019s iOS and iPadOS devices and Safari browser have violated one of the internet\u2019s most sacrosanct security policies. The violation results from a <a href=\"https:\/\/www.wired.com\/tag\/vulnerabilities\/\">bug<\/a> that leaks user identities and browsing activity in real time.<\/p>\n<p class=\"paywall\">This story originally appeared on <a data-offer-url=\"https:\/\/arstechnica.com\/information-technology\/2022\/01\/safari-and-ios-bug-reveals-your-browsing-activity-and-id-in-real-time\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/arstechnica.com\/information-technology\/2022\/01\/safari-and-ios-bug-reveals-your-browsing-activity-and-id-in-real-time\/&quot;}\" href=\"https:\/\/arstechnica.com\/information-technology\/2022\/01\/safari-and-ios-bug-reveals-your-browsing-activity-and-id-in-real-time\/\" rel=\"nofollow noopener\" target=\"_blank\">Ars Technica<\/a>, a trusted source for technology news, tech policy analysis, reviews, and more. Ars is owned by WIRED&#x27;s parent company, Cond\u00e9 Nast.<\/p>\n<p class=\"paywall\">The <a data-offer-url=\"https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/Security\/Same-origin_policy\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/Security\/Same-origin_policy&quot;}\" href=\"https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/Security\/Same-origin_policy\" rel=\"nofollow noopener\" target=\"_blank\">same-origin policy<\/a> is a foundational security mechanism that forbids documents, scripts, or other content loaded from one origin\u2014meaning the protocol, domain name, and port of a given webpage or app\u2014from interacting with resources from other origins. Without this policy, malicious sites\u2014say, badguy.example.com\u2014could access login credentials for <a href=\"https:\/\/www.wired.com\/tag\/google\/\">Google<\/a> or another trusted site when it\u2019s open in a different browser window or tab.<\/p>\n<p class=\"paywall\">Since September\u2019s release of Safari 15 and <a href=\"https:\/\/www.wired.com\/tag\/ios\/\">iOS<\/a> and iPadOS 15, this policy has been broken wide open, <a data-offer-url=\"https:\/\/fingerprintjs.com\/blog\/indexeddb-api-browser-vulnerability-safari-15\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/fingerprintjs.com\/blog\/indexeddb-api-browser-vulnerability-safari-15\/&quot;}\" href=\"https:\/\/fingerprintjs.com\/blog\/indexeddb-api-browser-vulnerability-safari-15\/\" rel=\"nofollow noopener\" target=\"_blank\">research published late last week<\/a> found. As <a data-offer-url=\"https:\/\/safarileaks.com\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/safarileaks.com\/&quot;}\" href=\"https:\/\/safarileaks.com\/\" rel=\"nofollow noopener\" target=\"_blank\">a demo site<\/a> graphically reveals, it\u2019s trivial for one site to learn the domains of sites open in other tabs or windows, as well as user IDs and other identifying information associated with the other sites.<\/p>\n<p class=\"paywall\">\u201cThe fact that database names leak across different origins is an obvious privacy violation,\u201d Martin Bajanik, a researcher at security firm FingerprintJS, wrote. He continued:<\/p>\n<p class=\"paywall\"><em>It lets arbitrary websites learn what websites the user visits in different tabs or windows. This is possible because database names are typically unique and website-specific. Moreover, we observed that in some cases, websites use unique user-specific identifiers in database names. This means that authenticated users can be uniquely and precisely identified.<\/em><\/p>\n<p class=\"paywall\">Attacks work on <a href=\"https:\/\/www.wired.com\/tag\/mac\/\">Macs<\/a> running Safari 15 and on any browser running on iOS or iPadOS 15. As the demo shows, safarileaks.com is able to detect the presence of more than 20 websites\u2014Google Calendar, YouTube, Twitter, and Bloomberg among them\u2014open in other tabs or windows. With more work, a real-world attacker could likely find hundreds or thousands of sites or webpages that can be detected.<\/p>\n<p class=\"paywall\">When users are logged in to one of these sites, the vulnerability can be abused to reveal the visit and, in many cases, identifying information in real time. When logged in to a Google account open elsewhere, for instance, the demo site can obtain the internal identifier Google uses to identify each account. Those identifiers can usually be used to recognize the account holder.<\/p>\n<p class=\"paywall\">The leak is the result of the way the Webkit browser engine implements IndexedDB, a programming interface supported by all major browsers. It holds large amounts of data and works by creating databases when a new site is visited. Tabs or windows that run in the background can continually query the IndexedDB API for available databases. This allows one site to learn in real time what other websites a user is visiting.<\/p>\n<p class=\"paywall\">Websites can also open any website in an iframe or pop-up window in order to trigger an IndexedDB-based leak for that specific site. By embedding the iframe or popup into its HTML code, a site can open another site in order to cause an IndexedDB-based leak for the site.<\/p>\n<p class=\"paywall\">\u201cEvery time a website interacts with a database, a new (empty) database with the same name is created in all other active frames, tabs, and windows within the same browser session,\u201d Bajanik wrote. \u201cWindows and tabs usually share the same session, unless you switch to a different profile, in Chrome for example, or open a private window.\u201d<\/p>\n<p class=\"paywall\">Bajanik said he notified <a href=\"https:\/\/www.wired.com\/tag\/apple\/\">Apple<\/a> of the vulnerability in late November, and as of publication time, it still had not been fixed in either Safari or the company&#x27;s mobile operating systems. Apple representatives didn\u2019t respond to an email asking if or when it would release a patch. As of Monday, Apple engineers had merged potential fixes and marked <a data-offer-url=\"https:\/\/github.com\/WebKit\/WebKit\/commit\/f73005ed826014988f8ee447de23927749fb56e5\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/github.com\/WebKit\/WebKit\/commit\/f73005ed826014988f8ee447de23927749fb56e5&quot;}\" href=\"https:\/\/github.com\/WebKit\/WebKit\/commit\/f73005ed826014988f8ee447de23927749fb56e5\" rel=\"nofollow noopener\" target=\"_blank\">Bajanik&#x27;s report<\/a> as resolved. End users, however, won&#x27;t be protected until the Webkit fix is incorporated into Safari 15 and iOS and iPadOS 15.<\/p>\n<p class=\"paywall\">For now, people should be wary when using Safari for desktop or any browser running on iOS or iPadOS. This isn\u2019t especially helpful for <a href=\"https:\/\/www.wired.com\/tag\/iphone\/\">iPhone<\/a> or <a href=\"https:\/\/www.wired.com\/tag\/ipad\/\">iPad<\/a> users, and in many cases, there\u2019s little or no consequence of browsing activities being leaked. In other situations, however, the specific sites visited and the order in which they were accessed can say a lot.<\/p>\n<p class=\"paywall\">\u201cThe only real protection is to update your browser or OS once the issue is resolved by Apple,\u201d Bajanik wrote. \u201cIn the meantime, we hope this article will raise awareness of this issue.\u201d<\/p>\n<p class=\"paywall\"><em>This story originally appeared on<\/em> <a data-offer-url=\"https:\/\/arstechnica.com\/information-technology\/2022\/01\/safari-and-ios-bug-reveals-your-browsing-activity-and-id-in-real-time\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/arstechnica.com\/information-technology\/2022\/01\/safari-and-ios-bug-reveals-your-browsing-activity-and-id-in-real-time\/&quot;}\" href=\"https:\/\/arstechnica.com\/information-technology\/2022\/01\/safari-and-ios-bug-reveals-your-browsing-activity-and-id-in-real-time\/\" rel=\"nofollow noopener\" target=\"_blank\"><em>Ars Technica<\/em><\/a><em>.<\/em><\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/ios-15-bug-leaking-user-browsing-activity-in-real-time\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/61e731353e654a13e9a16fc8\/master\/pass\/Security-iOS-15-Leak-107178697.jpg\"\/><\/p>\n<p><strong>Credit to Author: Dan Goodin, Ars Technica| Date: Wed, 19 Jan 2022 18:15:00 +0000<\/strong><\/p>\n<p>Apple has known about the vulnerability, which also affects iPadOS 15 and Safari 15, since late November.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21357],"class_list":["post-18077","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-security-news"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18077","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18077"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18077\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18077"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18077"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18077"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}