Sketch before 75 allows library feeds to be used to bypass file quarantine. Files are automatically downloaded and opened, without the com.apple.quarantine extended attribute. This results in remote code execution, as demonstrated by CommandString in a terminal profile to Terminal.app.
References
Link | Resource |
---|---|
https://jonpalmisc.com/2021/11/22/cve-2021-40531 | Exploit Third Party Advisory |
https://www.sketch.com/updates/#version-75 | Patch Release Notes Vendor Advisory |
https://jonpalmisc.com/2021/11/22/cve-2021-40531 | Exploit Third Party Advisory |
https://www.sketch.com/updates/#version-75 | Patch Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:24
Type | Values Removed | Values Added |
---|---|---|
References | () https://jonpalmisc.com/2021/11/22/cve-2021-40531 - Exploit, Third Party Advisory | |
References | () https://www.sketch.com/updates/#version-75 - Patch, Release Notes, Vendor Advisory |
Information
Published : 2021-09-06 21:15
Updated : 2024-11-21 06:24
NVD link : CVE-2021-40531
Mitre link : CVE-2021-40531
CVE.ORG link : CVE-2021-40531
JSON object : View
Products Affected
sketch
- sketch
apple
- macos
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type