Skip to content

Trigii/CVE-2023-42860

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2023-42860

Exploit for CVE-2023-42860 (for research purposes only).

This exploit works for versions of macOS earlier to 13.3, even though Apple´s changelog says it was fixed in version 14.1.

Steps

  1. Download the InstallAssistant.pkg
  2. Modify the variable TARGET_FILE to a SIP protected file (default target is the system TCC database).
  3. Compile the exploit:
$ gcc exploit.c -o exploit -lpthread
  1. Run the exploit:
$ ./exploit PATH_TO_PKG
  1. You should now be able to modify the SIP protected file through /Applications/Install\ macOS\ Ventura.app/Contents/SharedSupport/SharedSupport.dmg as the root user.

Reference

https://blog.kandji.io/apple-mitigates-vulnerabilities-installer-scripts

Releases

No releases published

Packages

No packages published