Submit #634656: mihomo-party-org mihomo-party 1.8.1 Local privilege abuse via unprotected UNIX socket in Mihomo Partinfo

Titlemihomo-party-org mihomo-party 1.8.1 Local privilege abuse via unprotected UNIX socket in Mihomo Part
DescriptionMihomo Party for macOS before version 1.8.1 exposes a root-owned UNIX socket (`/tmp/mihomo-party-helper.sock`) with world-readable and writable permissions. This socket accepts unauthenticated HTTP requests for setting system-wide proxy configurations. A local attacker can connect to this socket and configure the system to route all traffic through an attacker-controlled server, leading to potential man-in-the-middle (MiTM) attacks and data exfiltration.
Source⚠️ https://github.com/SwayZGl1tZyyy/zero-days/blob/main/mihomo-party/README.md
User
 SwayZGl1tZyyy (UID 88771)
Submission08/14/2025 15:23 (8 months ago)
Moderation08/25/2025 17:08 (11 days later)
StatusAccepted
VulDB entry321343 [Mihomo Party up to 1.8.1 on macOS Socket src/main/sys/sysproxy.ts enableSysProxy temp file]
Points20

Interested in the pricing of exploits?

See the underground prices here!