{"id":22875,"date":"2018-09-25T16:05:45","date_gmt":"2018-09-25T20:05:45","guid":{"rendered":"https:\/\/mjtsai.com\/blog\/?p=22875"},"modified":"2021-07-06T17:00:18","modified_gmt":"2021-07-06T21:00:18","slug":"bypassing-mojave-security-protections","status":"publish","type":"post","link":"https:\/\/mjtsai.com\/blog\/2018\/09\/25\/bypassing-mojave-security-protections\/","title":{"rendered":"Bypassing Mojave Security Protections"},"content":{"rendered":"<p><a href=\"https:\/\/www.macrumors.com\/2018\/09\/24\/macos-mojave-bypass-vulnerability\/\">Juli Clover<\/a>:<\/p>\n<blockquote cite=\"https:\/\/www.macrumors.com\/2018\/09\/24\/macos-mojave-bypass-vulnerability\/\">\n<p>Researcher Patrick Wardle, who has uncovered many security flaws in Apple&rsquo;s macOS operating system, today shared some details on a new vulnerability that he&rsquo;s found in the newly released macOS Mojave update.<\/p>\n<p>As outlined by <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/macos-mojave-privacy-bypass-flaw-allows-access-to-protected-files\/\">BleepingComputer<\/a>, Wardle discovered that he was able to access Contacts data from the address book using an unprivileged app, as demonstrated in the video below.<\/p>\n<\/blockquote>\n\n<p>And a separate vulnerability from <a href=\"https:\/\/www.sentinelone.com\/blog\/mojaves-security-hardening-user-protections-bypassed\/\">Sentinel One<\/a>:<\/p>\n<blockquote cite=\"https:\/\/www.sentinelone.com\/blog\/mojaves-security-hardening-user-protections-bypassed\/\">\n<p>Here, we have remotely logged in to Sally&rsquo;s user account via <code>ssh<\/code> and retrieved the last website she visited, a banking logon page, by reading the <tt>LastSession.plist<\/tt> stored in the (supposedly) protected Safari folder.<\/p>\n<p>Importantly, the ability to <code>ssh<\/code> into the local account and traverse the protected folders does not require pre-approval of Terminal in Full Disk Access, and can even be performed locally by Sally herself with <code>ssh<\/code>[&#8230;] In short, any local or remote user can bypass the Full Disk Access requirement simply by logging in via <code>ssh<\/code>.<\/p>\n<\/blockquote>\n\n<p>This is pretty demoralizing. I&rsquo;ve spent months trying to make smooth user experiences in spite of the hurdles Apple has added for developers (in some cases without even telling them). Some things are <a href=\"https:\/\/c-command.com\/forums\/showthread.php\/5368-Airmail-3-6-3-and-SpamSieve-on-macOS-10-14\">broken<\/a> and not in my control to fix. Even once things settle down, my customers will still have to jump through extra hoops to use my apps. And yet the bad guys can still get at the protected data, anyway.<\/p>\n\n<p>Presumably these will be fixed, and maybe Apple will eventually improve the user interface, but it just seems like this shipped far before it was ready. As did the rest of Mojave, as there wasn&rsquo;t even time to distribute <a href=\"https:\/\/twitter.com\/rgriff\/status\/1044302193824649216\">a GM build<\/a>.<\/p>\n\n<p>Previously: <a href=\"https:\/\/mjtsai.com\/blog\/2018\/09\/10\/mojaves-new-security-and-privacy-protections-face-usability-challenges\/\">Mojave&rsquo;s New Security and Privacy Protections Face Usability Challenges<\/a>.<\/p>\n\n<p>Update (2018-09-25): <a href=\"https:\/\/twitter.com\/lapcatsoftware\/status\/1044682801679921152\">Jeff Johnson<\/a>:<\/p>\n<blockquote cite=\"https:\/\/twitter.com\/lapcatsoftware\/status\/1044682801679921152\">\n<p>I&rsquo;ve got 1 too, different from the other 2<\/p>\n<\/blockquote>\n\n<p id=\"bypassing-mojave-security-protections-update-2018-09-26\">Update (2018-09-26): <a href=\"https:\/\/twitter.com\/dnanian\/status\/1044316840762183681\">Dave Nanian<\/a>:<\/p>\n<blockquote cite=\"https:\/\/twitter.com\/dnanian\/status\/1044316840762183681\">\n<p>The nice thing about the Vista-ing of Mojave is that it&rsquo;s a huge pain for everyone but the people who you have to worry about.<\/p>\n<\/blockquote>\n\n<p id=\"bypassing-mojave-security-protections-update-2018-09-27\">Update (2018-09-27): <a href=\"https:\/\/lapcatsoftware.com\/articles\/mojave-privacy.html\">Jeff Johnson<\/a>:<\/p>\n<blockquote cite=\"https:\/\/lapcatsoftware.com\/articles\/mojave-privacy.html\">\n<p>I used a different attack vector than SentinelOne (ssh) and Wardle. I don&rsquo;t know what Patrick&rsquo;s attack vector is, but I did ask him if he used mine, and he said no. So there are at least 3 different privacy protection bypasses in Mojave. I suspect that there are even more.<\/p>\n<\/blockquote>\n\n<p id=\"bypassing-mojave-security-protections-update-2018-11-06\">Update (2018-11-06): <a href=\"https:\/\/lapcatsoftware.com\/articles\/mojave-privacy2.html\">Jeff Johnson<\/a>:<\/p>\n<blockquote cite=\"https:\/\/lapcatsoftware.com\/articles\/mojave-privacy2.html\"><p>As of today, the support document does not mention the privacy protection bypass that I discovered and alluded to in my blog post. Nonetheless, macOS 10.14.1 does appear to fix the main issue, although there remain other avenues for bypassing Mojave&rsquo;s privacy protections under certain conditions.<\/p><p>[&#8230;]<\/p><p>The privacy protection bypass that I discovered is quite simple. It&rsquo;s obvious that Apple exempted some of its own code from Mojave&rsquo;s privacy protections; for example, you&rsquo;re able to navigate protected folders in Finder without triggering permission dialogs.[&#8230;] The body in this case was Automator. Or more accurately, <code>\/usr\/bin\/automator<\/code>.<\/p><p>[&#8230;]<\/p><p>Another possible way to bypass Mojave privacy protections is to &ldquo;piggyback&rdquo; on another app. Even if a malicious app is unable to obtain special permission itself, the app can use another app that has already been granted permission, such as Terminal app.<\/p><\/blockquote>","protected":false},"excerpt":{"rendered":"<p>Juli Clover: Researcher Patrick Wardle, who has uncovered many security flaws in Apple&rsquo;s macOS operating system, today shared some details on a new vulnerability that he&rsquo;s found in the newly released macOS Mojave update. As outlined by BleepingComputer, Wardle discovered that he was able to access Contacts data from the address book using an unprivileged [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"apple_news_api_created_at":"2018-09-25T20:05:47Z","apple_news_api_id":"2dc4e12a-e90f-471e-b463-03ca3fd3445c","apple_news_api_modified_at":"2021-07-06T21:00:23Z","apple_news_api_revision":"AAAAAAAAAAAAAAAAAAAACA==","apple_news_api_share_url":"https:\/\/apple.news\/ALcThKukPRx60YwPKP9NEXA","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_is_hidden":false,"apple_news_is_paid":false,"apple_news_is_preview":false,"apple_news_is_sponsored":false,"apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":"\"\"","apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[2],"tags":[1040,131,2095,30,1609,355,48,506,318,1960],"class_list":["post-22875","post","type-post","status-publish","format-standard","hentry","category-technology","tag-automator","tag-bug","tag-exploit","tag-mac","tag-macos-10-14","tag-privacy","tag-security","tag-ssh","tag-terminal","tag-transparency-consent-and-control-tcc"],"apple_news_notices":[],"_links":{"self":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/22875","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/comments?post=22875"}],"version-history":[{"count":6,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/22875\/revisions"}],"predecessor-version":[{"id":23306,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/22875\/revisions\/23306"}],"wp:attachment":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/media?parent=22875"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/categories?post=22875"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/tags?post=22875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}