{"id":51967,"date":"2026-05-20T14:14:10","date_gmt":"2026-05-20T18:14:10","guid":{"rendered":"https:\/\/mjtsai.com\/blog\/?p=51967"},"modified":"2026-05-20T14:14:38","modified_gmt":"2026-05-20T18:14:38","slug":"hijacking-apps-using-archive-utility","status":"publish","type":"post","link":"https:\/\/mjtsai.com\/blog\/2026\/05\/20\/hijacking-apps-using-archive-utility\/","title":{"rendered":"Hijacking Apps Using Archive Utility"},"content":{"rendered":"<p><a href=\"https:\/\/mysk.blog\/2026\/05\/19\/cve-2026-28910\/\">Talal Haj Bakry and Tommy Mysk<\/a> (<a href=\"https:\/\/mastodon.social\/@mysk\/116601815227104406\">Mastodon<\/a>):<\/p>\n<blockquote cite=\"https:\/\/mysk.blog\/2026\/05\/19\/cve-2026-28910\/\">\n<p>Until macOS 26.4, Archive Utility had nearly unrestricted filesystem access. Combined with a drag-and-drop sandbox quirk, this let an attacker bypass App Sandbox data containers, Transparency, Consent, and Control (TCC) protections, and hijack third-party apps &mdash; all without special permissions or elevated privileges.<\/p>\n<p>[&#8230;]<\/p>\n<p>Here&rsquo;s one interesting aspect of the macOS app sandbox: dragging and dropping a file or folder onto an application grants it unrestricted access to the dropped item. This is by design. Without it, apps couldn&rsquo;t access files dragged from protected locations like <code>~\/Desktop<\/code> or <code>~\/Documents<\/code>, and drag and drop wouldn&rsquo;t work in sandboxed apps at all.<\/p>\n<p>[&#8230;]<\/p>\n<p>Knowing about the drag-and-drop loophole, an attacker can try to convince a user to drag and drop Archive Utility&rsquo;s preferences file into Terminal, which lets them rewrite Archive Utility&rsquo;s output folder. From there, copying a file out of an app data container is a two-step move: compress the target file inside a protected area, then extract the archive into a folder the attacker controls.<\/p>\n<p>[&#8230;]<\/p>\n<p>Code signing should have prevented this kind of tampering with the application bundle, but for some reason macOS didn&rsquo;t complain. We would like to investigate this further.<\/p>\n<\/blockquote>\n\n<p>Previously:<\/p>\n<ul>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2026\/04\/10\/privacy-t-show-intent-based-access\/\">Privacy &amp; Security Settings Don&rsquo;t Show Intent-Based Access<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2026\/04\/03\/macos-26-4-paste-protection\/\">macOS 26.4 Paste Protection<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2026\/03\/25\/macos-26-4\/\">macOS 26.4<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2024\/10\/21\/tcc-and-gatekeeper-bypasses\/\">TCC and Gatekeeper Bypasses<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2019\/12\/18\/persistent-file-access-via-com-apple-macl-xattr\/\">Persistent File Access via com.apple.macl Xattr<\/a><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Talal Haj Bakry and Tommy Mysk (Mastodon): Until macOS 26.4, Archive Utility had nearly unrestricted filesystem access. Combined with a drag-and-drop sandbox quirk, this let an attacker bypass App Sandbox data containers, Transparency, Consent, and Control (TCC) protections, and hijack third-party apps &mdash; all without special permissions or elevated privileges. [&#8230;] Here&rsquo;s one interesting aspect [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"apple_news_api_created_at":"2026-05-20T18:14:14Z","apple_news_api_id":"fc28e098-4560-4778-bb37-48f40b796979","apple_news_api_modified_at":"2026-05-20T18:14:14Z","apple_news_api_revision":"AAAAAAAAAAD\/\/\/\/\/\/\/\/\/\/w==","apple_news_api_share_url":"https:\/\/apple.news\/A_CjgmEVgR3i7N0j0C3lpeQ","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_is_hidden":false,"apple_news_is_paid":false,"apple_news_is_preview":false,"apple_news_is_sponsored":false,"apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":"\"\"","apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[2],"tags":[131,466,2095,30,2742,53,48,1960],"class_list":["post-51967","post","type-post","status-publish","format-standard","hentry","category-technology","tag-bug","tag-codesigning","tag-exploit","tag-mac","tag-macos-tahoe-26","tag-sandboxing","tag-security","tag-transparency-consent-and-control-tcc"],"apple_news_notices":[],"_links":{"self":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/51967","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/comments?post=51967"}],"version-history":[{"count":2,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/51967\/revisions"}],"predecessor-version":[{"id":51971,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/51967\/revisions\/51971"}],"wp:attachment":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/media?parent=51967"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/categories?post=51967"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/tags?post=51967"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}