Jump to content

“Huge” number of Mac apps vulnerable to hijacking, and a fix is elusive

A vulnerability is discovered in a large number of Mac OS X apps . A hacker on the same network can inject malicious code using man in the middle attack.

 

 

mac-app-exploit-640x341.png

Quote

The Next Web:

The vulnerability specifically targets those that use Sparkle — a third-party software update framework — and unencrypted HTTP connections.

Quote

Ars Technica

Camtasia, uTorrent, and a large number of other Mac apps are susceptible to man-in-the-middle attacks that install malicious code, thanks to a vulnerability in Sparkle, the third-party software framework the apps use to receive updates.

The vulnerability is the result of apps that use a vulnerable version of Sparkle along with an unencrypted HTTP channel to receive data from update servers. It involves the way Sparkle interacts with functions built into the WebKit rendering engine to allow JavaScript execution. As a result, attackers with the ability to manipulate the traffic passing between the end user and the server—say, an adversary on the same Wi-Fi network—can inject malicious code into the communication. A security engineer who goes by the name Radek said that the attack is viable on both the current El Capitan Mac platform and its predecessor Yosemite.

Here's a video showing a proof-of-concept attack performed against a vulnerable version of the Sequel Pro app:  Sequel Pro - RCE vulnerability

 

A comment in the Ars Technica article: 

Quote

Here's how to list all apps that use Sparkle on your system, and what version they are using:

find /Applications -path '*Autoupdate.app/Contents/Info.plist' -exec echo {} \; -exec grep -A1 CFBundleShortVersionString '{}' \; | grep -v CFBundleShortVersionString

You're looking for versions prior to 1.13.1 (as per https://github.com/sparkle-project/Sparkle/releases). These are vulnerable if they are set to load any assets over unsecured HTTP. Perhaps someone else can chine in on where those URLs can be found.

Sources: Ars Trchnica  , The Next Web 

 

Opinion : No matter how secure your OS is 3rd party softwares can always make your system vulnerable. Mac and Linux are not foolproof.

 

Link to comment
Share on other sites

Link to post
Share on other sites

This is why I hate people who say, "There are never malicious attacks on Mac, because you can't exploit it." It just flat out isn't true, hope they get this patched.

You should join the Linux Party, we have a Bash.

Link to comment
Share on other sites

Link to post
Share on other sites

4 hours ago, xunil said:

This is why I hate people who say, "There are never malicious attacks on Mac, because you can't exploit it." It just flat out isn't true, hope they get this patched.

a third party framework being the trigger is important to note in addition. so even if OS X was 100% secure by itself(it obviously isn't). The presence of third party code can always compromises that.

Everything you need to know about AMD cpus in one simple post.  Christian Member 

Wii u, ps3(2 usb fat),ps4

Iphone 6 64gb and surface RT

Hp DL380 G5 with one E5345 and bunch of hot swappable hdds in raid 5 from when i got it. intend to run xen server on it

Apple Power Macintosh G5 2.0 DP (PCI-X) with notebook hdd i had lying around 4GB of ram

TOSHIBA Satellite P850 with Core i7-3610QM,8gb of ram,default 750hdd has dual screens via a external display as main and laptop display as second running windows 10

MacBookPro11,3:I7-4870HQ, 512gb ssd,16gb of memory

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×