MacOS bug bounty

MacOS bug bounty

255 bookmarks
Custom sorting
SSD Advisory – macOS Finder RCE - SSD Secure Disclosure
SSD Advisory – macOS Finder RCE - SSD Secure Disclosure
TL;DR Find out how a vulnerability in macOS Finder system allows remote attackers to trick users into running arbitrary commands. Vulnerability Summary A […]
·ssd-disclosure.com·
SSD Advisory – macOS Finder RCE - SSD Secure Disclosure
(CVE-2020-9771) mount_apfs TCC bypass and privilege escalation · theevilbit blog
(CVE-2020-9771) mount_apfs TCC bypass and privilege escalation · theevilbit blog
TL;DR We could mount the entire file system through APFS snapshots as read-only, with the noowners flag, which enables us accessing (almost) every file in the file system, including data (documents, files, etc…) of every user on the system, including those protected by Apple’s privacy framework (TCC). Even with the Guest account we could read files of admin accounts as Guest! 😱 This could be achieved with a single command, for example: mount_apfs -o noowners -s http://com.
·theevilbit.github.io·
(CVE-2020-9771) mount_apfs TCC bypass and privilege escalation · theevilbit blog
(CVE-2020-29621) Play the music and bypass TCC
(CVE-2020-29621) Play the music and bypass TCC
Introduction This vulnerability has been disclosed during my & Csaba’s talk “20+ ways to bypass macOS your privacy mechanisms” during Black Hat USA. It was a part of my COVID-19 lockdown research. 😉 In the end this vulnerability led to full TCC bypass as I was able to fully control the TCC database. How I found this vulnerability After the XPC research, I had an idea to verify if it will be possible to use the same tricks but on the macOS processes.
·wojciechregula.blog·
(CVE-2020-29621) Play the music and bypass TCC
(CVE-2021-30798) TCC Bypass Again, Inspired By XCSSET
(CVE-2021-30798) TCC Bypass Again, Inspired By XCSSET
My team and I posted the details of the brand new Mac Malware XCSSET last year [1] [2], and disclosed the interesting 0 day tricks used inside. All the XCSSET payload modules were reviewed carefully. However, I was a newbie for hunting macOS vulnerability and I didn’t realize the TCC bypass is a vulnerability at that time until Jamf posted their new blog and detailed the 3rd 0 day used by XCSSET.
·jhftss.github.io·
(CVE-2021-30798) TCC Bypass Again, Inspired By XCSSET
Alex Plaskett
Alex Plaskett
Random Security Research
·alexplaskett.github.io·
Alex Plaskett
Wojciech Reguła
Wojciech Reguła
Welcome to my blog where I describe found in free time vulnerabilities, and other worth writing IT security things.
·wojciechregula.blog·
Wojciech Reguła
THEEVILBIT
THEEVILBIT
·theevilbit.github.io·
THEEVILBIT
Scott Knight
Scott Knight
Reverse engineering and debugging.
·knight.sc·
Scott Knight