Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-22600 PoC — Apple tvOS 权限许可和访问控制问题漏洞

Source
Associated Vulnerability
Title:Apple tvOS 权限许可和访问控制问题漏洞 (CVE-2022-22600)
Description:Apple tvOS是美国苹果(Apple)公司的一套智能电视操作系统。 Apple tvOS 存在权限许可和访问控制问题漏洞,该漏洞的存在是由于 Sandbox 中的权限逻辑不正确。恶意应用程序可以绕过某些隐私偏好。
Description
CVE-2022-22600 Proof of Concept
Readme
# MSF-screenrecord-on-MacOS
!!! This vulnerability has been simultaneously discovered or taken by Sudhakar Muthumani of Primefort Private Limited, Khiem Tran and listed as CVE-2022-22600. This is despite I already emailing Apple regarding this back in 2021.
## Affected Versions
As a student, I have limited access to devices in which I can test this vulnerability. The versions I have tested so far are `MacOS 12.1`, `MacOS 12.0`, and `MacOS 11.6.1`.

## POC
Files are in the POC directory. Just run `POC.sh` and a screenshot will be produced without TCC prompt.

## So what is the bug?
MacOS stores permissions based on executables. Thus, if the executable cannot be found after the code has already been loaded into memory, no permissions are restricted.
## Patched versions -- According to Apple
The issue was addressed with improved permissions logic. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4, macOS Monterey 12.3, watchOS 8.5. A malicious application may be able to bypass certain Privacy preferences.
File Snapshot

[4.0K] /data/pocs/1bd181e1e412e29b1611b3b0a554c6521e618262 ├── [4.0K] POC │   ├── [ 93] POC.sh │   ├── [ 49K] screenshot │   └── [ 665] screenshot.m └── [1.0K] README.md 1 directory, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.