Skip to content

pvieito/ContainerMigrationExploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

21 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

ContainerMigrationExploit

You can find more info about this in this blog post.

TL;DR

The vulnerability CVE-2024-40801 in macOS allowed a sandboxed app to bypass TCC protections and access sensitive user data without requiring user permission. By leveraging the container-migration.plist feature, a sandboxed app could request the migration of TCC-protected files (like Safari history, Mail database, or user documents) to its app container, effectively bypassing TCC and giving the app full access to these files. This issue has since been fixed in macOS Sonoma 14.7 and macOS Sequoia 15.0.

Projects

This project includes multiple examples demonstrating this vulnerability.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published