Security News > 2021 > April > Critical RCE Bug Found in Homebrew Package Manager for macOS and Linux
A recently identified security vulnerability in the official Homebrew Cask repository could have been exploited by an attacker to execute arbitrary code on users' machines that have Homebrew installed.
The issue, which was reported to the maintainers on April 18 by a Japanese security researcher named RyotaK, stemmed from the way code changes in its GitHub repository were handled, resulting in a scenario where a malicious pull request - i.e., the proposed changes - could be automatically reviewed and approved.
Homebrew is a free and open-source software package manager solution that allows the installation of software on Apple's macOS operating system as well as Linux.
Homebrew Cask extends the functionality to include command-line workflows for GUI-based macOS applications, fonts, plugins, and other non-open source software.
"The discovered vulnerability would allow an attacker to inject arbitrary code into a cask and have it be merged automatically," Homebrew's Markus Reiter said.
In light of the findings, Homebrew has removed the "Automerge" GitHub Action as well as disabled and removed the "Review-cask-pr" GitHub Action from all vulnerable repositories.
News URL
http://feedproxy.google.com/~r/TheHackersNews/~3/JgNcfCyhnCE/critical-rce-bug-found-in-homebrew.html
Related news
- Apache issues patches for critical Struts 2 RCE bug (source)
- Critical RCE Flaw in GFI KerioControl Allows Remote Code Execution via CRLF Injection (source)
- Hackers exploit critical Aviatrix Controller RCE flaw in attacks (source)
- Critical SimpleHelp Flaws Allow File Theft, Privilege Escalation, and RCE Attacks (source)
- Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation (source)