The application Sensei Mac Cleaner contains a local privilege escalation vulnerability, allowing an attacker to perform multiple operations as the root user. These operations include arbitrary file deletion and writing, loading and unloading daemons, manipulating file permissions, and loading extensions, among other actions.
The vulnerable module org.cindori.SenseiHelper can be contacted via XPC. While the module performs client validation, it relies on the client's PID obtained through the public processIdentifier property of the NSXPCConnection class. This approach makes the module susceptible to a PID Reuse Attack, enabling an attacker to impersonate a legitimate client and send crafted XPC messages to invoke arbitrary methods exposed by the HelperProtocol interface.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://pentraze.com/vulnerability-reports |
History
Mon, 25 Nov 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Sensei
Sensei sensei Mac Cleaner |
|
CPEs | cpe:2.3:a:sensei:sensei_mac_cleaner:*:*:*:*:*:*:*:* | |
Vendors & Products |
Sensei
Sensei sensei Mac Cleaner |
|
Metrics |
ssvc
|
Mon, 25 Nov 2024 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The application Sensei Mac Cleaner contains a local privilege escalation vulnerability, allowing an attacker to perform multiple operations as the root user. These operations include arbitrary file deletion and writing, loading and unloading daemons, manipulating file permissions, and loading extensions, among other actions. The vulnerable module org.cindori.SenseiHelper can be contacted via XPC. While the module performs client validation, it relies on the client's PID obtained through the public processIdentifier property of the NSXPCConnection class. This approach makes the module susceptible to a PID Reuse Attack, enabling an attacker to impersonate a legitimate client and send crafted XPC messages to invoke arbitrary methods exposed by the HelperProtocol interface. | |
Title | macOS Sensei Mac Cleaner Local Privilege Escalation via PID Reuse - Race Condition Attack | |
Weaknesses | CWE-863 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Pentraze
Published: 2024-11-25T17:45:39.978Z
Updated: 2024-11-25T18:43:52.579Z
Reserved: 2024-08-18T02:59:02.835Z
Link: CVE-2024-7915
Vulnrichment
Updated: 2024-11-25T18:43:47.332Z
NVD
Status : Received
Published: 2024-11-25T18:15:14.530
Modified: 2024-11-25T18:15:14.530
Link: CVE-2024-7915
Redhat
No data.