The Zoom Client before 4.4.53932.0709 on macOS allows remote code execution, a different vulnerability than CVE-2019-13450. If the ZoomOpener daemon (aka the hidden web server) is running, but the Zoom Client is not installed or can't be opened, an attacker can remotely execute code with a maliciously crafted launch URL. NOTE: ZoomOpener is removed by the Apple Malware Removal Tool (MRT) if this tool is enabled and has the 2019-07-10 MRTConfigData.
References
Link | Resource |
---|---|
https://twitter.com/riskybusiness/status/1149125147019767814 | Third Party Advisory |
https://twitter.com/wcbowling/status/1149457231504498689 | Exploit Third Party Advisory |
https://twitter.com/JLLeitschuh/status/1149420685405708295 | Third Party Advisory |
https://twitter.com/JLLeitschuh/status/1149422543658520578 | Third Party Advisory |
https://support.zoom.us/hc/en-us/articles/201361963-New-Updates-for-Mac-OS | Release Notes Vendor Advisory |
https://gist.github.com/wbowling/13f9f90365c171806b9ffba2c841026b | Third Party Advisory |
https://twitter.com/wcbowling/status/1166998107667619841 | Third Party Advisory |
Configurations
Information
Published : 2019-07-11 21:15
Updated : 2020-08-24 10:37
NVD link : CVE-2019-13567
Mitre link : CVE-2019-13567
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
zoom
- zoom