Risk
7/29/2008
12:15 AM
Jordan Wiens
Jordan Wiens
Commentary
50%
50%

Apple And Security: Long Road Still Ahead

Apple's trying to pick up its game with iPhone security, recently listing an iPhone Security Engineer position. Assuming the job is really about helping users -- and not just thwarting pesky unlockers -- it's a good move, but some corporate inertia might need to be overcome before security is a true priority. Just take a look at the official iPhone Enterprise Deployment tools.

Apple's trying to pick up its game with iPhone security, recently listing an iPhone Security Engineer position. Assuming the job is really about helping users -- and not just thwarting pesky unlockers -- it's a good move, but some corporate inertia might need to be overcome before security is a true priority. Just take a look at the official iPhone Enterprise Deployment tools.Apple's Enterprise iPhone support site contains links to three tools to create custom configuration files that can be used to provision large numbers of iPhones in an enterprise environment. The only documentation is a PDF deployment guide hidden in plain sight in the middle of the main graphic on that page.

Unfortunately, taking a quick peek at the Web Utility 1.0 for Mac reveals not only huge usability flaws, but some potential security problems, too.

The installer is lacking any documentation, and gives no feedback as to what it's doing. Poking into the deployment guide reveals that it isn't just a tool for deploying configuration rules via a Web server, it actually is an entire Web server installed onto the machine used to create the configurations. Poking through the source reveals an embedded Ruby on Rails application, and here's where it begins to get really sketchy.

The server installs itself on port 3000, is remotely accessible by default, and uses a default username and password (admin:admin) that can only be changed by finding the source files yourself and hand-editing the hard-coded credentials. You'll find the settings in the "authentication.rb" file, which addtitionally contains this particularly amusing comment:

# This file contains the (plain-text) user name and passwords for individuals # authorized to access the iPhone Configuration Web Utility # # This should be used for testing purposes only. #

Whoops!

Fortunately, Apple has been doing some good security work lately in securing the version of Ruby on its systems (Apple often runs outdated versions of software with known vulnerabilities and is usually many weeks or months late in distributing patches to those included applications) through the efforts of Drew Yao. At least it's not installing a version of Ruby that is vulnerable out of the box.

Of course, that assumes the application itself was written securely, but given the nature of how the entire service is installed and configured, it seems like that might be too much to ask for.

If you decide that the security risk is a bit much for you, or even if you're simply done creating your configuration files, good luck disabling the Web server your Mac is now running. There is no uninstallation method documented anywhere on Apple's site for actually removing the service! So any future vulnerability in Ruby unnecessarily exposes your machine, even if it no longer needs the running service.

Ironically, it's actually easier to use a GUI in Windows to disable the Windows version of the same service (through the Administrative Services control panel) than the recommended commandline in OS X.

One unofficial method to remove the service once installed was posted as a comment over at TUAW: [http://www.tuaw.com/2008/07/10/apple-releases-iphone-configuration-web-utility-1-0/] :

sudo launchctl unload /System/Library/LaunchDaemons/com.apple.iPhoneConfigService.plist sudo rm /System/Library/LaunchDaemons/com.apple.iPhoneConfigService.plist

Of course, that still leaves the plethora of files installed by the package in the first place that will require manual removal. What a mess!

It would be nice to think that this is more indicative of a rushed iPhone 2.0 deployment than Apple's general attitude toward security. Sadly, that doesn't seem to be the case, as demonstrated by Apple's handling (or lack thereof) of the recent DNS cache poisoning attack.

Hat-tip to Ryan Naraine over at the Zero Day blog for catching Apple's security engineer job posting.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7896
Published: 2015-03-03
Multiple cross-site scripting (XSS) vulnerabilities in HP XP P9000 Command View Advanced Edition Software Online Help, as used in HP Device Manager 6.x through 8.x before 8.1.2-00, HP XP P9000 Tiered Storage Manager 6.x through 8.x before 8.1.2-00, HP XP P9000 Replication Manager 6.x and 7.x before ...

CVE-2014-9283
Published: 2015-03-03
The BestWebSoft Captcha plugin before 4.0.7 for WordPress allows remote attackers to bypass the CAPTCHA protection mechanism and obtain administrative access via unspecified vectors.

CVE-2014-9683
Published: 2015-03-03
Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename.

CVE-2015-0656
Published: 2015-03-03
Cross-site scripting (XSS) vulnerability in the login page in Cisco Network Analysis Module (NAM) allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCum81269.

CVE-2015-0890
Published: 2015-03-03
The BestWebSoft Google Captcha (aka reCAPTCHA) plugin before 1.13 for WordPress allows remote attackers to bypass the CAPTCHA protection mechanism and obtain administrative access via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.