Evernote before 7.13 GA on macOS allows code execution because the com.apple.quarantine attribute is not used for attachment files, as demonstrated by a one-click attack involving a drag-and-drop operation on a crafted Terminal file.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Link | Tags |
---|---|
https://evernote.com/security/updates#MACOSNOTE-28956 | vendor advisory |
https://www.youtube.com/watch?v=OG2tKlZX5bg | third party advisory exploit |