漏洞信息
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
macOS Archify: Local Privilege Escalation
漏洞描述信息
The Archify application contains a local privilege escalation vulnerability due to insufficient client validation in its privileged helper tool, com.oct4pie.archifyhelper, which is exposed via XPC. Archify follows the "factored applications" model, delegating privileged operations—such as arbitrary file deletion and file permission changes—to this helper running as root. However, the helper does not verify the code signature, entitlements, or signing flags of the connecting client. Although macOS provides secure validation mechanisms like auditToken, these are not implemented. As a result, any local process can establish a connection to the helper and invoke privileged functionality, leading to unauthorized execution of actions with root-level privileges.
CVSS信息
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
漏洞类别
关键功能的认证机制缺失
漏洞标题
Archify 访问控制错误漏洞
漏洞描述信息
Archify是澳大利亚Archify的一个建筑设计专业平台。 Archify存在访问控制错误漏洞,该漏洞源于特权助手工具com.oct4pie.archifyhelper客户端验证不足,可能导致本地进程以root权限执行特权操作。
CVSS信息
N/A
漏洞类别
授权问题