How Did I Easily Find Stored XSS at Apple And Earn $5000 ?

Crypto
3 min readApr 13, 2024

Hello there ! Today we’ll talk about stored XSS which I found in Apple. Without further ado let’s get into it !

Apple Sec.
Apple Sec.

First of all, our vulnerable Apple service was: https://discussions.apple.com

This service is a community where Apple users and developers discuss their problems. If you register here you can create a profile for yourself and help others or get help from them !

My Apple Discussions Account
It Was My Profile

Now let’s look at a simple example profile.

This is a simple profile that I have prepared for you. As you can see you can edit the “Location” and “Bio” sections as you wish.

What If We Use A XSS Payload ?

Hmm
Hmm

Payload that will be used is :

"><svg/onload=alert(1)>

We’ll place this payload in the “Location” section of our Apple profile and take a look at the result together !

XSS
XSS

As you can see this is a Stored XSS vulnerability that is very easy to exploit ! Cookies of users and employees could be stolen, and it was very easy to achieve that with this way !

:-o
:-o

As soon as I found something like this, I immediately contacted Apple Security via e-mail. At the end of our 3-month process, I received an e-mail like the one below and I was rewarded !

$5000
Yuppi

This is how I got the XSS vulnerability in Apple in a very easy way and completed it with great success ! I leave you with Apple’s Hall Of Fame list and my position on the list below.

https://support.apple.com/en-us/102812 (June 2022) (@xrypt0)

Thank you for reading this far and paying attention. See you in future articles !

bb
bb

Crypto (@xrypt0)

X

--

--