Skip to content

In Notion Web Clipper 1.0.3(7), a .nib file is susceptible to the Dirty NIB attack.

Notifications You must be signed in to change notification settings

louiselalanne/CVE-2024-23745

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 

Repository files navigation

CVE-2024-23745

In Notion Web Clipper 1.0.3(7), a .nib file is susceptible to the Dirty NIB attack. NIB files can be manipulated to execute arbitrary commands. Additionally, even if a NIB file is modified within an application, Gatekeeper may still permit the execution of the application, enabling the execution of arbitrary commands within the application's context.

Impact

Attackers could exploit this vulnerability to execute unauthorized commands within the Notion application, potentially compromising sensitive user data or performing malicious actions.

PoC

  • First, you need create de malicious NIB
image1
image2
image3
image4
More details in: https://blog.xpnsec.com/dirtynib/

- Notion Application

image6
image7
- Copy malicious nib to app

image8
image9
- Open the malicous application

image10

Thanks

Thanks to Giovanni Lima, Cyber Security Engineer and friend. We worked together to reproduce de Dirty Nib PoC 😎

References:

https://book.hacktricks.xyz/macos-hardening/macos-security-and-privilege-escalation/macos-proces-abuse/macos-dirty-nib
https://www.notion.so/web-clipper

About

In Notion Web Clipper 1.0.3(7), a .nib file is susceptible to the Dirty NIB attack.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published