Skip to content

Proof of concept exploit for CVE-2019-8561 discovered by @jbradley89

License

Notifications You must be signed in to change notification settings

0xmachos/CVE-2019-8561

Repository files navigation

CVE-2019-8561

Proof of concept exploit for CVE-2019-8561 discovered by Jaron Bradley (@jbradley89) (Patched in macOS 10.14.4). This script exploits a TOCTOU bug in installer which enables code execution as root.

See Jaron's Objective By the Sea v2 talk "Bad Things in Small Packages" where he demonstrates getting r00t and bypassing SIP.

(N.B All scripts other than gpg_poc are half finished and likely don't work in their current state. Published for sake of completeness)

My accompanying blog post "CVE-2019-8561 Proof of Concept Exploit".

Monitors$HOME/Downloads for a GPG Suite DMG. When it finds one it converts the DMG from read only to RW then resizes it to 60MB.

Once the installer starts it expands the package, modifies the preinstall script to create /var/test via touch then flattens it in place of the original package.

The modified package contents will be used by installer however the UI will still indicate that the package is correctly code signed.

Tested on:

  • 10.14.2

About

Proof of concept exploit for CVE-2019-8561 discovered by @jbradley89

Topics

Resources

License

Stars

Watchers

Forks

Languages