Mistune

Remote code execution vulnerabilities
that have been hiding for a decade

Upcoming Presentation

What’s Mistune?

Mistune is a remote exploit targeting iOS 14.2 on iPhone 11, successfully demostrated by @codecolorist at TianfuCup 2020. It consists of two bugs that were introduced by iOS 3 and iOS 6 respectively. They were born with Generation Z!

Full chain remote code execution means that by opening a malicious link (wherever it comes, such as mail, direct messages and AirDrop), the attacker may be able to access your Contacts, Camera, Payments history and load further payload to gain higher privileges.

Although the exploit is delievered via traditional web browser 1-click vector, the bugs are unique compared to known WebKit exploits.

Is it a jailbreak?

Nope. I’m a noob and I know nothing about kernel exploitation. It’s just userspace exploits.

Were the bugs patched?

Yes.

After direct disclosure to the vendor, CVE-2021-1748 was patched by iOS 14.4 and CVE-2021-1864 was gone after iOS 14.5.

iTunes Store

Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and iPod touch (7th generation)

Impact: Processing a maliciously crafted URL may lead to arbitrary JavaScript code execution

Description: A validation issue was addressed with improved input sanitization.

CVE-2021-1748: CodeColorist working with Ant Security Light-Year Labs

iTunes Store

Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and iPod touch (7th generation)

Impact: An attacker with JavaScript execution may be able to execute arbitrary code

Description: A use after free issue was addressed with improved memory management.

CVE-2021-1864: CodeColorist of Ant-Financial LightYear Labs

Those bugs were probably never been exploited in-the-wild because they left significant traces by switching to a local app, which is not ideal for real attackers. But you should always keep your phone updated to avoid n-day attacks.

What’s the attack vector?

The entrance is a special universal link. When Safari opens the link, it redirects to iTunes Store app without user’s confirmation. The link can also be opened via iMessage and AirDrop.

I’ve verified several popular 3rd-party instant messengers to successfully trigger the bug, including Telegram, WhatsApp, Signal and Google Handouts.

Everyone is born unique. What makes it special?

Usually an exploit starts from WebKit, loads shellcode and try to exploit other bugs to escalate the privilege. Both of the bugs of Mistune were triggered and exploited in JavaScript, but they were targeting a pre-installed app, iTunes Store, instead of MobileSafari.

Mistune could directly escape browser sandbox before native code execution (CVE-2021-1748). In fact, it’s capable of reading sensitive information and launching arbitrary app (including our beloved Calculator) with zero memory corruption, making it invincible to modern memory safety and control-flow integrity mitigations.

A second memory safety issue (CVE-2021-1864) was used to gain full shellcode execution. Interestingly, it was not possible to trigger this without the first sandbox bug, while you can always influently replace this part with any working WebKit exploit.

iOS remained standing at various pwn contests after Pointer Authentication Code (PAC) was shipped by A12 chip. TianfuCup 2020 is the very first successful event that has this category pwned.

No, but hardware matters when it comes to exploitation. Some hardware level mitigations significantly raised the bar.

What exact mitigations have been bypassed?

The exploit was really tough for me. It’s a state-of-the-art phone that has various protections. I was just being lucky that some mitigation was already in progress but not shipped at the time, which could’ve totally broken the exploit.

Pointer Authentication Code (PAC)

This is the most remarkable protection for the challenge. With hardware-assisted control-flow integrity, it was not easy for most known browser exploit primitives to work.

Sandbox

MobileSafari has JavaScript running in a very restrictive, containerized process. The exploit uses a client-site XSS to easily switch to a loose context with extra attack surfaces, while Just-in-Time still remains avaliable.

Contacts, MediaLibrary and Camera are protected by TCC framework. Third party apps and web sites need user’s approvement before accessing them. This exploit got shellcode executed in a very special context where those accesses are explicitly granted.

Hardened JIT

Hardened Just-in-Time compiler leverages special system registers to implement W^X policy to JIT-ed code, to protect it from being altered by arbitrary memory read and write. The exploit had arbitrary shellcode successfully executed. Besides, this could have been the highest privilege that the shellcode could get after jsc executable had been dropped from iOS.

Others

As the exploit was not really targetting WebKit itself, protections like Gigacage, PACCage, StructureID Randomization are not the main concerns.

Instead, it totally relied on Objective-C runtime to build all the primitives. Objective-C had introduced several little-known protections before it, including runtime obfuscation and randomization. The exploit has bypassed some of them at the time of the contest.

Glad to see some new improvements by 14.5 effectively stops many of them after the report.

Acknowledgement

I would like to thank the organizer of TianfuCup for hosting the event and helping with the disclosure. Also thank Apple product security team for reviewing the issues, shipping the patches within reasonable time and the recognition.

The dynamic logo was created with PhotoMosh. Impressive tool!


Enough logos for bugs!

- So you are just another security researcher trying to hype?
- More than that. I've even filmed a commercial!

Just for fun.

Write-ups eta wen

Both the bugs have been patched now, including some of the exploitation techniques. Stay tuned for our BlackHat talk!

Hack Different: Pwning iOS 14 with Generation Z Bugz (BlackHat USA 2021)