Privilege Escalation in macOS PKG Installers
嗯,用户让我总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”这样的开头。首先,我得仔细阅读文章内容,理解主要信息。 文章讲的是Miniconda3包安装器在v23.11.0–1之前的版本中存在漏洞。这个漏洞允许注入脚本,这些脚本在安装时以root权限执行,从而实现本地权限提升。具体来说,是两个post-link文件被注入到conda包中,并在安装过程中被执行。 我需要把这些关键点浓缩到100字以内。可能的结构是:描述漏洞、影响、利用方式和结果。这样既简洁又全面。 另外,用户可能希望这个总结用于报告或快速了解问题,所以语言要准确且易懂。避免技术术语过多,但又要保留关键信息。 最后,检查字数是否符合要求,确保没有使用任何开头的固定句式。 </think> Miniconda3安装器旧版本存在漏洞,允许注入脚本并在安装时以root权限执行,导致本地权限提升。该漏洞涉及两个post-link文件被注入到conda包中,并在安装过程中由conda.exe以高权限执行。 2025-12-25 14:30:30 Author: infosecwriteups.com(查看原文) 阅读量:4 收藏

m8sec

The second vulnerability identified was in the Miniconda3 package installer before v23.11.0–1. Again, it was possible to inject scripts created by the installer and subsequently executed with root permissions to achieve local privilege escalation:

Press enter or click to view image in full size

Miniconda3 23.10.0–1 root privilege escalation PoC

Command Injection

Using our modified file monitor, two post-link files, packaged as part of miniconda3/pkgs/python.app-3-py310h1a28f6b_0.conda and unpackaged during installation by prepare_installation.pkg, were susceptible to injection:

The following screenshot shows the expanded package installer where the prepare_installation.pkg resides:

Expanded Miniconda3-py310_23.10.0-1-MacOSX-arm64.pkg

Privileged Execution

The two injected post-link files were written to disk and executed during installation with elevated permissions by conda.exe – located in the installer’s run_installation.pkg/Scripts/postinstall script:

# Perform the conda install
...
PREFIX="$2/miniconda3"
PREFIX=$(cd "$PREFIX"; pwd)
export PREFIX
echo "PREFIX=$PREFIX"
CONDA_EXEC="$PREFIX/conda.exe"
# /COMMON UTILS
...
"$CONDA_EXEC" install --offline --file "$PREFIX/pkgs/env.txt" -yp "$PREFIX"…

文章来源: https://infosecwriteups.com/privilege-escalation-in-macos-pkg-installers-cf3d3b6b8e31?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh