Описание
BinaryNights ForkLift 3.4 was compiled with the com.apple.security.cs.disable-library-validation flag enabled which allowed a local attacker to inject code into ForkLift. This would allow the attacker to run malicious code with escalated privileges through ForkLift's helper tool.
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 3.4 (включая)
cpe:2.3:a:binarynights:forklift:*:*:*:*:*:macos:*:*
EPSS
Процентиль: 10%
0.00035
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-862
Связанные уязвимости
github
больше 3 лет назад
BinaryNights ForkLift 3.4 was compiled with the com.apple.security.cs.disable-library-validation flag enabled which allowed a local attacker to inject code into ForkLift. This would allow the attacker to run malicious code with escalated privileges through ForkLift's helper tool.
EPSS
Процентиль: 10%
0.00035
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-862