CVE-2021-40531

Sketch before 75 allows library feeds to be used to bypass file quarantine. Files are automatically downloaded and opened, without the com.apple.quarantine extended attribute. This results in remote code execution, as demonstrated by CommandString in a terminal profile to Terminal.app.
References
Link Resource
https://jonpalmisc.com/2021/11/22/cve-2021-40531 Exploit Third Party Advisory
https://www.sketch.com/updates/#version-75 Patch Release Notes Vendor Advisory
https://jonpalmisc.com/2021/11/22/cve-2021-40531 Exploit Third Party Advisory
https://www.sketch.com/updates/#version-75 Patch Release Notes Vendor Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:sketch:sketch:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:24

Type Values Removed Values Added
References () https://jonpalmisc.com/2021/11/22/cve-2021-40531 - Exploit, Third Party Advisory () https://jonpalmisc.com/2021/11/22/cve-2021-40531 - Exploit, Third Party Advisory
References () https://www.sketch.com/updates/#version-75 - Patch, Release Notes, Vendor Advisory () https://www.sketch.com/updates/#version-75 - Patch, Release Notes, Vendor Advisory

Information

Published : 2021-09-06 21:15

Updated : 2024-11-21 06:24


NVD link : CVE-2021-40531

Mitre link : CVE-2021-40531

CVE.ORG link : CVE-2021-40531


JSON object : View

Products Affected

sketch

  • sketch

apple

  • macos
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type