Incident: Vulnerabilities in Apple Pay Integration Expose Websites to Attacks

Published Date: 2019-08-08

Postmortem Analysis
Timeline 1. The software failure incident regarding vulnerabilities in Apple Pay integration with third-party websites was first noticed by security researcher Joshua Maddux last fall [88901]. 2. The article was published on August 8, 2019. 3. Estimating from the clue "last fall" and the publication date, the incident likely occurred in the fall of 2018.
System The system that failed in the software failure incident described in the article is the integration between third-party websites and Apple Pay, specifically in how websites can configure the integration with Apple Pay. The vulnerabilities stemmed from the connection between a site and the Apple Pay infrastructure, and the validation mechanism that could be established in various ways at the host site's discretion. The failure can be attributed to the following: 1. Integration between third-party websites and Apple Pay, allowing for potential vulnerabilities in how websites configure the integration [Article 88901].
Responsible Organization 1. Third-party merchants and services integrating Apple Pay into their websites [88901]
Impacted Organization 1. Third-party merchants and services offering Apple Pay as a payment option were impacted by the software failure incident [88901].
Software Causes 1. The software causes of the failure incident were vulnerabilities introduced by the integration of Apple Pay into third-party websites, allowing attackers to potentially extract authorization tokens or privileged data [88901].
Non-software Causes 1. Lack of awareness among developers about server side request forgery vulnerabilities [88901]
Impacts 1. The software failure incident exposed vulnerabilities in the integration of Apple Pay into third-party websites, potentially allowing attackers to extract privileged data and gain access to the website's backend infrastructure [88901].
Preventions 1. Implementing stricter validation mechanisms for the connection between websites and third-party integrations like Apple Pay could have prevented the vulnerability from being exploited [88901]. 2. Providing more specific directions and fewer options for website integrations, similar to how Google Pay handles its integration, could have reduced the potential exposures [88901]. 3. Increasing awareness among developers about server-side request forgery vulnerabilities and how to mitigate them could help prevent similar incidents in the future [88901].
Fixes 1. Implement more specific and fewer options for configuring the integration of Apple Pay to reduce potential exposures [88901]. 2. Increase awareness among developers about server-side request forgery vulnerabilities and how to mitigate them when integrating Apple Pay [88901].
References 1. Joshua Maddux, security researcher at PKC Security [88901]

Software Taxonomy of Faults

Category Option Rationale
Recurring multiple_organization (a) The software failure incident related to vulnerabilities in integrating Apple Pay has not been reported to have happened again within the same organization (Apple) or with its products and services. The article primarily focuses on the specific vulnerability discovered by the security researcher Joshua Maddux and the potential risks associated with integrating Apple Pay into websites. (b) The article mentions that the type of vulnerability discovered, known as "server side request forgery," is not unique to Apple Pay integration and can be found in other web integrations as well. It highlights that similar vulnerabilities can exist in various integrations across the web, not just with the Apple Pay module. This suggests that the issue of server side request forgery is not limited to a single organization but can potentially affect multiple organizations that integrate third-party services into their websites [88901].
Phase (Design/Operation) design (a) The software failure incident described in the article is related to the design phase. The vulnerability and potential attack vector identified by the security researcher, Joshua Maddux, were a result of the integration of Apple Pay into websites by third-party merchants and services. The flaw was not in Apple Pay itself but in the way websites could configure the integration, allowing for potential exploitation by attackers through server-side request forgery vulnerabilities. This highlights how the design and implementation of the integration process introduced unintended security risks [88901]. (b) The software failure incident is not directly related to the operation phase or misuse of the system. The vulnerability stemmed from the design and integration of Apple Pay into websites, rather than from the operation or misuse of the system by users. The focus was on the design flaw that could be exploited by attackers to gain unauthorized access to the backend infrastructure of websites that had integrated Apple Pay [88901].
Boundary (Internal/External) within_system, outside_system (a) The software failure incident discussed in the article is within the system. The vulnerability and potential attack vector identified by the security researcher, Joshua Maddux, are related to the integration of Apple Pay into websites by third-party merchants and services. The issue arises from the way the connection between a site and the Apple Pay infrastructure is established, allowing for potential exploitation by attackers to extract privileged data and gain access to the website's backend infrastructure [88901].
Nature (Human/Non-human) non-human_actions (a) The software failure incident discussed in the article is related to non-human actions. Specifically, the vulnerability in Apple Pay's integration with third-party websites introduced a flaw that could expose the host website to attacks. This vulnerability was not a flaw in Apple Pay itself or its payment network but rather an unintended consequence of the web interconnections and third-party integrations [88901]. The issue allowed attackers to potentially extract authorization tokens or privileged data, leading to unauthorized access to the website's backend infrastructure. This type of vulnerability, known as "server-side request forgery," can be exploited by attackers to bypass protections like firewalls and directly send commands to web applications [88901].
Dimension (Hardware/Software) software (a) The software failure incident reported in the article is not related to hardware issues. It focuses on vulnerabilities in the integration of Apple Pay into websites, which are software-related issues. The vulnerabilities identified by the security researcher Joshua Maddux are related to the way websites integrate with the Apple Pay application programming interface, allowing attackers to exploit the connection between the site and Apple Pay infrastructure [88901].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident discussed in the article is malicious in nature. The vulnerability identified in the integration of Apple Pay into websites could be exploited by attackers to potentially extract sensitive data or gain unauthorized access to the website's backend infrastructure. This vulnerability falls under the category of "server side request forgery," which allows attackers to bypass protections like firewalls and directly send commands to web applications. The article mentions that such vulnerabilities are regularly exploited in the wild and played a role in the recent Capital One breach [88901].
Intent (Poor/Accidental Decisions) poor_decisions (a) The software failure incident related to the Apple Pay integration vulnerability can be categorized under poor_decisions. The vulnerability was not a flaw in Apple Pay itself but rather an unintended consequence of how websites integrated Apple Pay into their systems. The article mentions that the connection between a site and the Apple Pay infrastructure, and the validation mechanism, can be established in various ways at the host site's discretion, which introduced vulnerabilities that could expose the host website to attacks [88901]. Additionally, the article highlights that the flexibility in how a website integrates Apple Pay potentially exposes its own backend infrastructure to unauthorized access, indicating that poor decisions in the integration process led to the vulnerability [88901].
Capability (Incompetence/Accidental) accidental (a) The software failure incident discussed in the article is not attributed to development incompetence. Instead, it highlights vulnerabilities introduced inadvertently due to the integration of Apple Pay into third-party websites, which exposed the host websites to potential attacks [88901]. (b) The software failure incident described in the article is more aligned with an accidental failure. The vulnerabilities that could expose websites to attacks were not intentional but rather a result of the way the integration between the websites and Apple Pay infrastructure was implemented, allowing for potential exploitation by attackers [88901].
Duration temporary The software failure incident discussed in the article is temporary. The vulnerability introduced by the integration of Apple Pay into websites was identified by a security researcher, Joshua Maddux, who noticed the issue and reported it to Apple in February [Article 88901]. The incident was not a permanent flaw in Apple Pay itself but rather a vulnerability that emerged from the web interconnections and third-party integrations, specifically related to how websites configured the integration with Apple Pay. Joshua Maddux proposed mitigations to Apple in March to address the issue, indicating that it was a temporary failure caused by specific circumstances rather than a permanent flaw inherent in the software.
Behaviour other (a) crash: The article does not mention any instances of a crash related to the Apple Pay vulnerability discussed. Therefore, there is no information to suggest that the failure was due to the system losing state and not performing any of its intended functions. (b) omission: The vulnerability discussed in the article does not involve the system omitting to perform its intended functions at an instance(s). Instead, it focuses on the unintended exposure of websites that have added support for Apple Pay to potential attacks. (c) timing: The issue with Apple Pay integration does not relate to the system performing its intended functions too late or too early. It is more about the potential vulnerabilities introduced by the way websites can configure the integration with Apple Pay. (d) value: The software failure incident related to Apple Pay does not involve the system performing its intended functions incorrectly. The vulnerability discussed is more about the exposure of websites to potential attacks due to the way the integration with Apple Pay is set up. (e) byzantine: The behavior of the software failure incident related to Apple Pay does not exhibit characteristics of a byzantine failure, which involves erroneous and inconsistent responses and interactions. The vulnerability discussed in the article is more about the potential security risks introduced by the integration with Apple Pay. (f) other: The behavior of the software failure incident related to Apple Pay can be categorized as a vulnerability in the integration process that could potentially expose websites to attacks. This vulnerability is not directly related to the system's core functions but rather to the way websites can configure the integration with Apple Pay, leading to potential security risks.

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property, theoretical_consequence (d) property: People's material goods, money, or data was impacted due to the software failure The software failure incident related to Apple Pay integration vulnerabilities exposed websites to potential attacks, allowing attackers to potentially extract authorization tokens or other privileged data, which could give them access to the website's backend infrastructure. This could lead to unauthorized access to users' data and potentially impact the security of the website's backend infrastructure [88901].
Domain finance (a) The failed system in the article is related to the finance industry as it involves vulnerabilities in the integration of Apple Pay into websites for online credit card transactions [88901].

Sources

Back to List