Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gjj3-8gx6-j9w7

Опубликовано: 26 мар. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 8.4

Описание

Fast CAD Reader application on MacOS was found to be installed with incorrect file permissions (rwxrwxrwx). This is inconsistent with standard macOS security practices, where applications should have drwxr-xr-x permissions. Incorrect permissions allow for Dylib Hijacking. Guest account, other users and applications can exploit this vulnerability for privilege escalation. This issue affects Fast CAD Reader in possibly all versions since the vendor has not responded to our messages. The tested version was 4.1.5

Fast CAD Reader application on MacOS was found to be installed with incorrect file permissions (rwxrwxrwx). This is inconsistent with standard macOS security practices, where applications should have drwxr-xr-x permissions. Incorrect permissions allow for Dylib Hijacking. Guest account, other users and applications can exploit this vulnerability for privilege escalation. This issue affects Fast CAD Reader in possibly all versions since the vendor has not responded to our messages. The tested version was 4.1.5

EPSS

Процентиль: 6%
0.00024
Низкий

8.4 High

CVSS4

Дефекты

CWE-266
CWE-732

Связанные уязвимости

nvd
11 месяцев назад

Fast CAD Reader application on MacOS was found to be installed with incorrect file permissions (rwxrwxrwx). This is inconsistent with standard macOS security practices, where applications should have drwxr-xr-x permissions. Incorrect permissions allow for Dylib Hijacking. Guest account, other users and applications can exploit this vulnerability for privilege escalation. This issue affects Fast CAD Reader in possibly all versions since the vendor has not responded to our messages. The tested version was 4.1.5

EPSS

Процентиль: 6%
0.00024
Низкий

8.4 High

CVSS4

Дефекты

CWE-266
CWE-732