louiselalanne / CVE-2024-23745

In Notion Web Clipper 1.0.3(7), a .nib file is susceptible to the Dirty NIB attack.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

CVE-2024-23745

In Notion Web Clipper 1.0.3(7), a .nib file is susceptible to the Dirty NIB attack. NIB files can be manipulated to execute arbitrary commands. Additionally, even if a NIB file is modified within an application, Gatekeeper may still permit the execution of the application, enabling the execution of arbitrary commands within the application's context.

Impact

Attackers could exploit this vulnerability to execute unauthorized commands within the Notion application, potentially compromising sensitive user data or performing malicious actions.

PoC

  • First, you need create de malicious NIB
image1
image2
image3
image4
More details in: https://blog.xpnsec.com/dirtynib/

- Notion Application

image6
image7
- Copy malicious nib to app

image8
image9
- Open the malicous application

image10

Thanks

Thanks to Giovanni Lima, Cyber Security Engineer and friend. We worked together to reproduce de Dirty Nib PoC 😎

References:

https://book.hacktricks.xyz/macos-hardening/macos-security-and-privilege-escalation/macos-proces-abuse/macos-dirty-nib
https://www.notion.so/web-clipper

About

In Notion Web Clipper 1.0.3(7), a .nib file is susceptible to the Dirty NIB attack.