MacOS bug bounty

MacOS bug bounty

255 bookmarks
Custom sorting
Technical Advisory – Apple macOS XAR – Arbitrary File Write (CVE-2022-22582)
Technical Advisory – Apple macOS XAR – Arbitrary File Write (CVE-2022-22582)
In October 2021, Apple released a fix for CVE-2021-30833. This was an arbitrary file-write vulnerability in the xar utility and was due to improper handling of path separation (forward-slash) characters when processing files contained within directory symlinks. Whilst analysing the patch for CVE-2021-30833, an additional vulnerability was identified which could allow for arbitrary file-write when unpacking a malicious XAR archive using the xar utility.
·research.nccgroup.com·
Technical Advisory – Apple macOS XAR – Arbitrary File Write (CVE-2022-22582)
CVE-2022-22616: Simple way to bypass GateKeeper, hidden for years
CVE-2022-22616: Simple way to bypass GateKeeper, hidden for years
In this writeup, I will introduce a very simple method to bypass GateKeeper , and uncover the root cause through reversing and debugging. Apple had already addressed it as CVE-2022-22616 in macOS Monterey 12.3, and credited the bug to two Jamf researchers (@malwarezoo, @jbradley89) and me. So, make sure you have updated your Mac devices to the latest version.
·jhftss.github.io·
CVE-2022-22616: Simple way to bypass GateKeeper, hidden for years
FORCEDENTRY: Sandbox Escape
FORCEDENTRY: Sandbox Escape
Posted by Ian Beer & Samuel Groß  of Google Project Zero We want to thank Citizen Lab for sharing a sample of the FORCEDENTRY exploit ...
·googleprojectzero.blogspot.com·
FORCEDENTRY: Sandbox Escape
Veni, MIDI, Vici — Conquering CVE-2022-22657 and CVE-2022-22664 — Atredis Partners
Veni, MIDI, Vici — Conquering CVE-2022-22657 and CVE-2022-22664 — Atredis Partners
Recently, Apple pushed two security fixes for issues in the way GarageBand and Logic Pro X parsed MIDI ( musical instrument digital interface ) data. GarageBand is free and is available in the default OS X image. Logic Pro X can be purchased in the App Store: MIDI Available for: macOS Big Sur
·atredis.com·
Veni, MIDI, Vici — Conquering CVE-2022-22657 and CVE-2022-22664 — Atredis Partners
Give Me Some (macOS) Context…
Give Me Some (macOS) Context…
This blog post will dive into what I like to call “execution contexts” on macOS and why it is important to understand these different…
·cedowens.medium.com·
Give Me Some (macOS) Context…
CVE-2020-27937 Change home directory and bypass TCC
CVE-2020-27937 Change home directory and bypass TCC
Introduction This is the second TCC vulnerability that has been disclosed on my & Csaba’s talk “20+ ways to bypass your macOS privacy mechanisms” during Black Hat USA. This time by changing the NFSHomeDirectory variable I was able to bypass user TCC restrictions. Do you remember the CVE-2020–9934: Bypassing the macOS Transparency, Consent, and Control (TCC) Framework for unauthorized access to sensitive user data article describing a vulnerability found by Matt Shockley?
·wojciechregula.blog·
CVE-2020-27937 Change home directory and bypass TCC
CVE-2021-30970 New macOS vulnerability, “powerdir,” could lead to unauthorized user data access
CVE-2021-30970 New macOS vulnerability, “powerdir,” could lead to unauthorized user data access
A new macOS vulnerability, “powerdir,” could allow an attacker to bypass the operating system’s TCC technology and gain unauthorized access to a user’s protected data. We shared our findings with Apple through Coordinated Vulnerability Disclosure (CVD) and Apple released a fix.
·microsoft.com·
CVE-2021-30970 New macOS vulnerability, “powerdir,” could lead to unauthorized user data access