iTnews
  • Home
  • News
  • Technology
  • Security

Apple Safari bug reveals users' internet activity and identities

By Juha Saarinen on Jan 18, 2022 6:51AM
Apple Safari bug reveals users' internet activity and identities

Vulnerability introduced in Safari 15 on iOS, iPadOS and macOS.

Apple's Safari web browser version 15 introduced a privacy-busting bug that can be abused to learn what sites users visit, and reveal their unique user identification data.

Software engineer Martin Bajanik discovered that Apple's implementation of the IndexedDB application programming interface violates a fundamental security mechanism in browsers, the same-origin policy.

The same-origin policy restricts documents and scripts running in browsers from interacting with resources hosted on other domains.

IndexedDB should adhere to the same-origin policy, but Bajanik found that it's possible to leak database names across multiple origins, in different browser windows and tabs.

"This means that authenticated users can be uniquely and precisely identified. Some popular examples would be YouTube, Google Calendar, or Google Keep.

"All of these websites create databases that include the authenticated Google User ID and in case the user is logged into multiple accounts, databases are created for all these accounts," Bajanik wrote.

iTnews was able to confirm that the bug exists, by going to Bajanik's SafariLeaks website that revealed Google user identification numbers.

No user action is required, and many popular websites interact with the IndexedDB API directly on their home pages. 

Using Safari's Private Mode incognito browsing does not protect against the bug, Bajanik said.

Even though browsers such as Google Chrome and Mozilla Firefox are not affected on desktop operating systems, on Apple's iOS and iPadOS they must use the WebKit rendering engine and are therefore vulnerable.

Until Apple fixes the bug, the only workaround for users is to disable all Javascript by default, and only allow it to run on known, trusted sites.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
applegoogleindexeddbsafarisecurity

Partner Content

Why rethinking your CMS is crucial for customer retention
Promoted Content Why rethinking your CMS is crucial for customer retention
Avoiding CAPEX by making on-premise IT more cloud-like
Promoted Content Avoiding CAPEX by making on-premise IT more cloud-like
The Great Resignation has intensified insider security threats
Promoted Content The Great Resignation has intensified insider security threats
How to turn digital complexity into competitive advantage
Promoted Content How to turn digital complexity into competitive advantage

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • Micro Focus Information Management & Governance (IM&G) Forum 2022
  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
  • Forrester Technology & Innovation Asia Pacific 2022
By Juha Saarinen
Jan 18 2022
6:51AM
0 Comments

Related Articles

  • Researchers devise stealthy phone tracking without fake base stations
  • NSO Group used fake GIFs to hack Apple iMessage
  • ACCC starts review of Google's Mandiant buyout
  • Threat actors worked with ISPs to plant malware from Italian spyware vendor
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

Researchers hacked Oracle servers to demo serious vulnerability

Researchers hacked Oracle servers to demo serious vulnerability

PayTo rollout kicks off

PayTo rollout kicks off

Australian scientists build world's first quantum computer IC

Australian scientists build world's first quantum computer IC

Digital Nation

IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
The security threat of quantum computing
The security threat of quantum computing
Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.