The Zoom Client before 4.4.53932.0709 on macOS allows remote code execution, a different vulnerability than CVE-2019-13450. If the ZoomOpener daemon (aka the hidden web server) is running, but the Zoom Client is not installed or can't be opened, an attacker can remotely execute code with a maliciously crafted launch URL. NOTE: ZoomOpener is removed by the Apple Malware Removal Tool (MRT) if this tool is enabled and has the 2019-07-10 MRTConfigData.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
https://twitter.com/riskybusiness/status/1149125147019767814 | third party advisory |
https://twitter.com/JLLeitschuh/status/1149420685405708295 | third party advisory |
https://twitter.com/wcbowling/status/1149457231504498689 | third party advisory exploit |
https://twitter.com/JLLeitschuh/status/1149422543658520578 | third party advisory |
https://support.zoom.us/hc/en-us/articles/201361963-New-Updates-for-Mac-OS | release notes vendor advisory |
https://gist.github.com/wbowling/13f9f90365c171806b9ffba2c841026b | third party advisory |
https://twitter.com/wcbowling/status/1166998107667619841 | third party advisory |