We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,258 News Articles

Apple will fix App Store vulnerability with iOS 6

Gives developers guidance for avoiding the App Store hack

Apple has issued guidance to iOS developers wondering how to protect their App Store apps from a hack that makes it possible to get in-app purchases for free. For now there is no fix, Apple simply promises that the vulnerability will be addressed in iOS 6.

The new support document states: "A vulnerability has been discovered in iOS 5.1 and earlier related to validating in-app purchase receipts by connecting to the App Store server directly from an iOS device." The post claims: "iOS 6 will address this vulnerability". Apple recommends that if developers follow the best practices described in the post their apps will not be affected by this attack.

The following best practices are recommended:

You app should perform receipt validation by sending the receipt to your server and having your server perform the validation with the App Store server. However, Apple notes that: "It may be vulnerable to similar attacks when connecting to your server".Use the appropriate cryptographic techniques to ensure that your app is actually connected to your server, and that your server is actually connected to the App Store server.

Apple admits: "If your app connects to the App Store server directly from the device, your app may be affected by this vulnerability." In this case it recommends the following:

Check that the SSL certificate used to connect to the App Store server is an EV certificate.Check that the information returned from validation matches the information in the SKPayment object.Check that the receipt has a valid signature.Check that new transactions have a unique transaction ID.

The App Store hack that lets iOS users trick the App Store into giving them in-app purchases for free went public almost two weeks ago. Alexey V. Borodin of Russia built the in-app purchase hack, which requires several steps--including installing bogus certificates on your device, and using a specially-crafted DNS server. Those ingredients combine to fool apps into believing that they're communicating with the App Store, when they're actually going to a Web server that pretends to the App Store instead. Borodin told Macworld that his exploit works in part by faking - or "spoofing" - the code receipts that Apple issues for in-app purchases which developers use for validation, with the iOS device configured to mistakenly believe that those receipts are coming directly from Apple.

Now, Borodin has published a hack that enables the same process through the Mac App Store.


Apple to combat App Store hack with device identifier?What the in-app purchase hack means for app makersApple says it's investigating App Store hackHacker exploits iOS flaw for free in-app purchases

IDG UK Sites

Best Christmas 2014 UK tech deals, Boxing Day 2014 UK tech deals & January sales 2015 UK tech...

IDG UK Sites

Apple's 2014 highlights: the most significant Apple news of 2014

IDG UK Sites

Watch this heartwarming Christmas short by Trunk for composer John Rutter

IDG UK Sites

Ultimate iOS 8 Tips: 35 awesome and advanced tips for using iOS 8 on iPhone and iPad