Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
macOS Archify: Local Privilege Escalation
Vulnerability Description
The Archify application contains a local privilege escalation vulnerability due to insufficient client validation in its privileged helper tool, com.oct4pie.archifyhelper, which is exposed via XPC. Archify follows the "factored applications" model, delegating privileged operations—such as arbitrary file deletion and file permission changes—to this helper running as root. However, the helper does not verify the code signature, entitlements, or signing flags of the connecting client. Although macOS provides secure validation mechanisms like auditToken, these are not implemented. As a result, any local process can establish a connection to the helper and invoke privileged functionality, leading to unauthorized execution of actions with root-level privileges.
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vulnerability Type
关键功能的认证机制缺失
Vulnerability Title
Archify 访问控制错误漏洞
Vulnerability Description
Archify是澳大利亚Archify的一个建筑设计专业平台。 Archify存在访问控制错误漏洞,该漏洞源于特权助手工具com.oct4pie.archifyhelper客户端验证不足,可能导致本地进程以root权限执行特权操作。
CVSS Information
N/A
Vulnerability Type
N/A