Back to directory
WRITEUP #3247

Write Up – Apple N/A: PII Information, Full Contact List, Main Phone No. And Main Icloud Email Extracted; Bug Patched: Arbitrary Local File Read Via Zip File And Symlinks On Ios Files App.

OtherArbitrary file read
by@omespino(Omar Espino)
Program
Apple
Published
Nov 17, 2021
Added to HackDex
Sep 15, 2022
Read Full Writeuphttps://omespino.com/write-up-apple-bug-bounty-n-a-arbitrary-local-file-read-via-zip-file-and-symlinks-usd/
RELATED WRITEUPS
CVE-2024-29511 – Abusing Ghostscript’s OCR device
OtherArbitrary file read
Data Theft in Salesforce: Manipulating Public Links
OtherSOQL injection
When Certificates Fail: A Story of Bypassed MFA in Remote Access
Other2FA / MFA bypass
SSTI in Bug Bounty Program: The Time I Played with Handlebars and Broke Stuff
OtherSSTI
Ghost In The Ppl Part 1: Byovdll
OtherUse-After-Free

Built with ❤️ by Shubham Rawat