7-Year-Old Critical RCE Flaw Found in Popular iTerm2 macOS Terminal App

iTerm2 macOS Terminal App

A 7-year-old critical remote code execution vulnerability has been discovered in iTerm2 macOS terminal emulator app—one of the most popular open source replacements for Mac’s built-in terminal app.

Tracked as CVE-2019-9535, the vulnerability in iTerm2 was discovered as part of an independent security audit funded by the Mozilla Open Source Support Program (MOSS) and conducted by cybersecurity firm Radically Open Security (ROS).

“MOSS selected iTerm2 for a security audit because it processes untrusted data, and it is widely used, including by high-risk targets (like developers and system administrators),” Mozilla says.

According to a blog post published today by Mozilla, the RCE flaw resides in the tmux integration feature of iTerm2, which, if exploited, could allow an attacker to execute arbitrary commands by providing malicious output to the terminal.

As shown in the video demonstration, potential attack vectors for this vulnerability include connecting to an attacker-controlled malicious SSH server, using commands like curl to fetch a malicious website, or using tail -f to follow a log file containing some malicious content.

Web Application Firewall

Besides this, the flaw can also be triggered…

http://feedproxy.google.com/~r/TheHackersNews/~3/m8ppnO200X0/iterm2-macos-terminal-rce.html

Have a comment? Type it below!