rapid7 / metasploit-framework

Metasploit Framework
https://www.metasploit.com/
Other
34.31k stars 14.01k forks source link

VMware Fusion (13.x before 13.6) priv esc (CVE-2024-38811) #19440

Open h00die opened 2 months ago

h00die commented 2 months ago

Summary

VMware Fusion (13.x before 13.6) contains a code-execution vulnerability due to the usage of an insecure environment variable. A malicious actor with standard user privileges may exploit this vulnerability to execute code in the context of the Fusion application.

Basic example

No PoCs have crossed my radar yet, but i didn't look hard: https://nvd.nist.gov/vuln/detail/CVE-2024-38811

Motivation

Not a lot of current exploits for OSX/macos, so one as easy as a env variable should be a quick win

kernelsmith commented 2 months ago

hmmmm, me likey the sound of this. See what I can find; no promises tho

kernelsmith commented 1 month ago

has anyone seen a POC or know what env variable is affected? I did some preliminary probing for the env var names, but didn't get far, tho I was using only simple methods like strings etc. I was too lazy at the time to actually disassemble the bin

kernelsmith commented 1 month ago

@h00die, have you seen any details yet? I've looked, but not extensively, but haven't found anything yet. Diffing 13.6 and 13.6.1 might be telling, but also is probably full of unrelated changes.

h00die commented 1 month ago

I haven't seen anything pop up on my news feeds. Also looks like https://github.com/nomi-sec/PoC-in-GitHub hasn't picked up on anything at this point.

kernelsmith commented 1 month ago

I haven't seen anything pop up on my news feeds. Also looks like https://github.com/nomi-sec/PoC-in-GitHub hasn't picked up on anything at this point.

ok, I'll bust out some real tools, see what I can find