| Título | mihomo-party-org mihomo-party 1.8.1 Local privilege abuse via unprotected UNIX socket in Mihomo Part |
|---|
| Descripción | Mihomo Party for macOS before version 1.8.1 exposes a root-owned UNIX socket (`/tmp/mihomo-party-helper.sock`) with world-readable and writable permissions. This socket accepts unauthenticated HTTP requests for setting system-wide proxy configurations. A local attacker can connect to this socket and configure the system to route all traffic through an attacker-controlled server, leading to potential man-in-the-middle (MiTM) attacks and data exfiltration.
|
|---|
| Fuente | ⚠️ https://github.com/SwayZGl1tZyyy/zero-days/blob/main/mihomo-party/README.md |
|---|
| Usuario | SwayZGl1tZyyy (UID 88771) |
|---|
| Sumisión | 2025-08-14 15:23 (hace 8 meses) |
|---|
| Moderación | 2025-08-25 17:08 (11 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 321343 [Mihomo Party hasta 1.8.1 en macOS Socket src/main/sys/sysproxy.ts enableSysProxy Local Privilege Escalation] |
|---|
| Puntos | 20 |
|---|