Security News > 2021 > September > Unpatched Apple Zero-Day in macOS Finder Allows Code Execution

For those not in the Apple camp, the macOS Finder is the default file manager and GUI front-end used on all Macintosh operating systems.
It's the first thing users see upon booting, and it governs the launching of other applications and the overall user management of files, disks and network volumes.
Inetloc files are Apple-specific, and function as shortcuts to internet locations, such as an RSS feed or a telnet location; or they can be used to open documents locally on someone's Mac within a browser using the "File://" format.
Inetloc files can be specially crafted to contain embedded commands.
The crafted files can then be attached to malicious emails, researchers added - and if users are socially engineered into clicking on them, those commands embedded inside automatically execute in stealth mode, with no alert or prompt given to victims.
"A vulnerability in the way macOS processes.Inetloc files causes it to run commands embedded inside, the commands it runs can be local to the macOS allowing the execution of arbitrary commands by the user without any warning/prompts," according to the advisory.
News URL
https://threatpost.com/unpatched-apple-zero-day-code-execution/174915/
Related news
- Apple fixes WebKit zero-day exploited in ‘extremely sophisticated’ attacks (source)
- Apple Releases Patch for WebKit Zero-Day Vulnerability Exploited in Targeted Attacks (source)
- Apple Backports Critical Fixes for 3 Recent 0-Days Impacting Older iOS and macOS Devices (source)
- Apple backports zero-day patches to older iPhones and Macs (source)