Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It's exploitable through apple's web-based login flow used by web sites and Android devices. There are multiple round trips between the user and apple, and state is passed over the wire. The state could be modified at a certain point in the flow to cause the final result (the JWT) to be compromised. The flow is still the same, they seem to have fixed it entirely by adding checks server-side.


(sorry, WAS exploitable)




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: