Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-22639 PoC — Apple iOS和Apple iPadOS 安全漏洞

Source
Associated Vulnerability
Title:Apple iOS和Apple iPadOS 安全漏洞 (CVE-2022-22639)
Description:Apple iOS和Apple iPadOS都是美国苹果(Apple)公司的产品。Apple iOS是一套为移动设备所开发的操作系统。Apple iPadOS是一套用于iPad平板电脑的操作系统。 iOS 15.4 和 iPadOS 15.4 之前版本 存在安全漏洞,该漏洞源于SoftwareUpdate子系统中的状态管理存在问题。该漏洞允许本地应用程序升级系统的权限。
Description
CVE-2022-22639: Get a Root Shell on macOS Monterey
Readme
# Details 
See Blog:

https://www.trendmicro.com/en_us/research/22/d/macos-suhelper-root-privilege-escalation-vulnerability-a-deep-di.html

# Exploitation of CVE-2022-22639
1. Compile with command:
`clang exploit.m -o /tmp/exploit -framework Foundation -fobjc-arc -fobjc-link-runtime /Applications/Xcode.app/Contents/Developer/Platforms/MacOSX.platform/Developer/SDKs/MacOSX.sdk/System/Library/PrivateFrameworks/SoftwareUpdate.framework/Versions/A/SoftwareUpdate.tbd`
2. Unzip **InstallAssistant.gz** to `/tmp` folder
3. run `/tmp/exploit`

# Demo
https://www.youtube.com/watch?v=-vbkTLHh874
File Snapshot

[4.0K] /data/pocs/7a020a7bd0ce076a6f6fa4fd93bb3d4ebf266b46 ├── [1.9K] exploit.m ├── [ 15M] InstallAssistant.gz └── [ 592] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.