| Title | mihomo-party-org mihomo-party 1.8.1 Local privilege abuse via unprotected UNIX socket in Mihomo Part |
|---|
| Description | Mihomo Party for macOS before version 1.8.1 exposes a root-owned UNIX socket (`/tmp/mihomo-party-helper.sock`) with world-readable and writable permissions. This socket accepts unauthenticated HTTP requests for setting system-wide proxy configurations. A local attacker can connect to this socket and configure the system to route all traffic through an attacker-controlled server, leading to potential man-in-the-middle (MiTM) attacks and data exfiltration.
|
|---|
| Source | ⚠️ https://github.com/SwayZGl1tZyyy/zero-days/blob/main/mihomo-party/README.md |
|---|
| User | SwayZGl1tZyyy (UID 88771) |
|---|
| Submission | 08/14/2025 15:23 (8 months ago) |
|---|
| Moderation | 08/25/2025 17:08 (11 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 321343 [Mihomo Party up to 1.8.1 on macOS Socket src/main/sys/sysproxy.ts enableSysProxy temp file] |
|---|
| Points | 20 |
|---|