Connect with us

Business

Microsoft releases tweet-size exploit for macOS sandbox escape bug

Published

on

Microsoft has published the exploit code for a vulnerability in macOS that could help an attacker bypass sandbox restrictions and run code on the system.

The company released the technical details for the security issue, which is currently identified as CVE-2022-26706, and explained how the macOS App Sandbox rules could be avoided to allow malicious macro code in Word documents to execute commands on the machine.

Abusing macros in Office documents to deploy malware has long been an efficient and popular technique to compromise Windows systems.

The same could be achieved on macOS machines lacking the proper security updates, Microsoft warns in a report today.

“Despite the security restrictions imposed by the App Sandbox’s rules on applications, it’s possible for attackers to bypass the said rules and let malicious codes “escape” the sandbox and execute arbitrary commands on an affected device” – Microsoft

Jonathan Bar Or of the Microsoft 365 Defender Research Team explains that the vulnerability was discovered while looking into methods to run and detect malicious macros in Microsoft Office documents on macOS.

To ensure backward compatibility, Microsoft Word can read and write files that come with the prefix “~$,” which is defined in the app’s sandbox rules. 

Sandbox rule for Microsoft Word on macOS
Sandbox rule for Microsoft Word on macOS
source: Microsoft

Exploit code in a tweet

After studying older reports [12] about escaping the macOS sandbox, the researchers found that using Launch Services to run an open –stdin command on a special Python file with the abovementioned prefix allows escaping the App Sandbox on macOS, potentially leading to compromising the system.

The researchers came up with a proof-of-concept (PoC) that used the -stdin option for the open Command on a Python file to bypass the “com.apple.quarantine” extended attribute restriction.

The demo exploit code is as simple as dropping a Python file that contains arbitrary commands and has in its name the special prefix for Word.

Using the open -stdin command starts the Python app with the specially crafted file as the standard input.

“Python happily runs our code, and since it’s a child process of launchd, it isn’t bound to Word’s sandbox rules,” Jonathan Or Bar explains.

Microsoft's exploit for escaping the macOS sandbox
macOS sandbox escape PoC
source: Microsoft

The researchers even managed to compress the exploit code above so much that it fits into a tweet.

Tweet-size exploit for escaping the macOS sandbox
Tweet-size version of macOS sandbox escape PoC​​​​​
source: Microsoft

Microsoft reported the vulnerability to Apple last year in October and a fix was delivered with the macOS security updates in May 2022 (Big Sur 11.6.6)

Credit for responsibly disclosing the issue is shared with another security researcher, Arsenii Kostromin, who found it independently.

Source: https://www.bleepingcomputer.com/news/security/microsoft-releases-tweet-size-exploit-for-macos-sandbox-escape-bug/

Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Copyright © 2023 Cyber Reports Cyber Security News All Rights Reserved Website by Top Search SEO