漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
ClearanceKit: opfilter policy bypass via non-open file operations
Vulnerability Description
ClearanceKit intercepts file-system access events on macOS and enforces per-process access policies. In versions on the 4.1 branch and earlier, the opfilter Endpoint Security system extension enforced file access policy exclusively by intercepting ES_EVENT_TYPE_AUTH_OPEN events. Seven additional file operation event types were not intercepted, allowing any locally running process to bypass the configured FAA policy without triggering a denial. Commit a3d1733 adds subscriptions for all seven event types and routes them through the existing FAA policy evaluator. AUTH_RENAME and AUTH_UNLINK additionally preserve XProtect change detection: events on the XProtect path are allowed and trigger the existing onXProtectChanged callback rather than being evaluated against user policy. All versions on the 4.2 branch contain the fix. No known workarounds are available.
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L
Vulnerability Type
授权机制缺失
Vulnerability Title
ClearanceKit 安全漏洞
Vulnerability Description
ClearanceKit是Craig J. Bass个人开发者的一个macOS文件系统访问控制工具。 ClearanceKit 4.1及之前版本存在安全漏洞,该漏洞源于未拦截七种文件操作事件类型,可能导致绕过文件访问策略。
CVSS Information
N/A
Vulnerability Type
N/A