The application Sensei Mac Cleaner contains a local privilege escalation vulnerability, allowing an attacker to perform multiple operations as the root user. These operations include arbitrary file deletion and writing, loading and unloading daemons, manipulating file permissions, and loading extensions, among other actions. The vulnerable module org.cindori.SenseiHelper can be contacted via XPC. While the module performs client validation, it relies on the client's PID obtained through the public processIdentifier property of the NSXPCConnection class. This approach makes the module susceptible to a PID Reuse Attack, enabling an attacker to impersonate a legitimate client and send crafted XPC messages to invoke arbitrary methods exposed by the HelperProtocol interface.
References
History

Mon, 25 Nov 2024 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Sensei
Sensei sensei Mac Cleaner
CPEs cpe:2.3:a:sensei:sensei_mac_cleaner:*:*:*:*:*:*:*:*
Vendors & Products Sensei
Sensei sensei Mac Cleaner
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 25 Nov 2024 18:00:00 +0000

Type Values Removed Values Added
Description The application Sensei Mac Cleaner contains a local privilege escalation vulnerability, allowing an attacker to perform multiple operations as the root user. These operations include arbitrary file deletion and writing, loading and unloading daemons, manipulating file permissions, and loading extensions, among other actions. The vulnerable module org.cindori.SenseiHelper can be contacted via XPC. While the module performs client validation, it relies on the client's PID obtained through the public processIdentifier property of the NSXPCConnection class. This approach makes the module susceptible to a PID Reuse Attack, enabling an attacker to impersonate a legitimate client and send crafted XPC messages to invoke arbitrary methods exposed by the HelperProtocol interface.
Title macOS Sensei Mac Cleaner Local Privilege Escalation via PID Reuse - Race Condition Attack
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Pentraze

Published: 2024-11-25T17:45:39.978Z

Updated: 2024-11-25T18:43:52.579Z

Reserved: 2024-08-18T02:59:02.835Z

Link: CVE-2024-7915

cve-icon Vulnrichment

Updated: 2024-11-25T18:43:47.332Z

cve-icon NVD

Status : Received

Published: 2024-11-25T18:15:14.530

Modified: 2024-11-25T18:15:14.530

Link: CVE-2024-7915

cve-icon Redhat

No data.