Unpatched macOS Bug Allows Remote Attackers To Execute Code

Share post:

Security researcher Park Minchan discovered a bug in Apple’s macOS devices that allows remote attackers to execute arbitrary commands on users’ devices.

This is done by shortcut files that have the inetloc extension, which is able to embed commands inside.

While internet shortcuts are present in both Windows and macOS systems, the vulnerability mainly affects users of macOS Big Sur and earlier versions, especially those using a native email client such as the “Mail” app.

Minchan clarified: “A vulnerability in the way macOS processes inetloc files causes it to run commands embedded inside, the commands it runs can be local to the macOS allowing the execution of arbitrary commands by the user without any warning/prompts. Originally, inetloc files are shortcuts to an internet location, such as an RSS feed or a telnet location; and contain the server address and possibly a username and password for SSH and telnet connections; can be created by typing a URL in a text editor and dragging the text to the Desktop.”

The vulnerability is caused by the inclusion of the “file://” URL which is used to retrieve files from a user’s computer system.

Therefore, a user opening a local file on their own computer with the Chrome or Safari web browser automatically creates the corresponding file:// location in the address bar, which makes it easy to design internet shortcuts or inetloc files to point to “file:/ /,” as opposed to HTTP files.

While Minchan acknowledged the fact that Apple had blocked the bug in the newer version of macOS from Big Sur, he explained that the tech company had conducted a case review that allowed File:// or fIIe:// to bypass the audit.

For more information, read the original story in Ars Technica.

Featured Tech Jobs


Related articles

Canada, U.S. sign international guidelines for safe AI development

Eighteen countries, including Canada, the U.S. and the U.K., today agreed on recommended guidelines to developers in their nations for the secure design, development, deployment, and operation of artificial intelligent systems. It’s the latest in a series of voluntary guardrails that nations are urging their public and private sectors to follow for overseeing AI in

Cyber Security Today, Nov. 27, 2023 – Ransomware gang posts data stolen from a Canadian POS provider, and more

This episode reports on the latest ransomware attacks, and details of how a gang that scams people selling used products on

Cyber Security Today, Week in Review for the week ending November 24, 2023

This episode features discussion on Australia's decision to not make ransowmare payments illegal, huge hacks of third-party service suppliers in Canada and the U.S. and whether email and smartphone service providers are doing enough to protect

Cyber Security Today, Nov. 24, 2023 – A warning to tighten security on Kubernetes containers, and more

This episode reports on the increasing number of vulnerable Kubernetes containers online, the latest acknowledged data breaches, a browser scam aimed at Macs

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways