Connect with us

Apple

A new bug in Apple’s Safari browser leaves your data open to theft

A fix is hopefully coming soon.

apple store selling iphone in new york
Image: Unsplash
Giveaway: Enter to win a BLUETTI Charger 1 ($399 value): Enter Here

Just a heads up, if you buy something through our links, we may get a small share of the sale. It’s one of the ways we keep the lights on here. Click here for more.

UPDATE 1/27/2022 10:03 AM ET: This vulnerability has now been patched thanks to a recent iOS 15.3 update. More info here.

There’s a new bug in Apple’s Safari web browser that leaves your data vulnerable to exposure. The bug is deep within the company’s WebKit browser development engine and it means that virtually anyone can gain access to your browser history and even some personal information.

Initially discovered by FingerprintJS, the new bug showed up in Safari 15 and involves the Indexed Database API (IndexedDB). IndexedDB essentially stores data on certain websites directly on your device so that the sites might load faster in the future.

The problem arises around the concept of the same-origin policy. The same-origin policy is a security measure that doesn’t allow websites to freely interact with each other using APIs like IndexedDB.

READ MORE: Safari is now used by over a billion people

The problem is due to the introduction of a new bug that violates the same-origin policy using IndexedDB. The bug causes the API to expose all of the data that it has collected to any website that users visit.

For Mac users, you can avoid the potential for danger by just switching to a different browser. But Apple mobile device users are out of luck, as the company requires that all browsers on its mobile devices use WebKit, which opens them up to the IndexedDB bug.

FingerprintJS notes that sites like Google utilize a unique User ID for all account databases that it collects. Using those unique IDs that can now be identified through this new browser bug, malicious websites can learn the identity of certain users, making it much easier to exploit them in some way.

This bug was initially discovered and reported to WebKit back in November. As of now, Apple has closed the support ticket and marked the issue as resolved with a list of potential fixes. But FingerprintJS says that “the bug continues to persist for end users until these changes are released.”

UPDATE 1/27/2022 10:03 AM ET: This vulnerability has now been patched thanks to a recent iOS 15.3 update. More info here.

Have any thoughts on this? Let us know down below in the comments or carry the discussion over to our Twitter or Facebook.

Editors’ Recommendations:

Follow us on Flipboard, Google News, or Apple News

Staff writer at KnowTechie. Alex has two years of experience covering all things technology, from video games to electric cars. He's a gamer at heart, with a passion for first-person shooters and expansive RPGs. Shoot him an email at alex@knowtechie.com

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

More in Apple