إرسال #634656: mihomo-party-org mihomo-party 1.8.1 Local privilege abuse via unprotected UNIX socket in Mihomo Partالمعلومات

عنوانmihomo-party-org mihomo-party 1.8.1 Local privilege abuse via unprotected UNIX socket in Mihomo Part
الوصفMihomo Party for macOS before version 1.8.1 exposes a root-owned UNIX socket (`/tmp/mihomo-party-helper.sock`) with world-readable and writable permissions. This socket accepts unauthenticated HTTP requests for setting system-wide proxy configurations. A local attacker can connect to this socket and configure the system to route all traffic through an attacker-controlled server, leading to potential man-in-the-middle (MiTM) attacks and data exfiltration.
المصدر⚠️ https://github.com/SwayZGl1tZyyy/zero-days/blob/main/mihomo-party/README.md
المستخدم
 SwayZGl1tZyyy (UID 88771)
ارسال14/08/2025 03:23 PM (8 أشهر منذ)
الاعتدال25/08/2025 05:08 PM (11 days later)
الحالةتمت الموافقة
إدخال VulDB321343 [Mihomo Party حتى 1.8.1 على macOS Socket src/main/sys/sysproxy.ts enableSysProxy Local Privilege Escalation]
النقاط20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!