CVE-2024-11681

A malicious or compromised MacPorts mirror can execute arbitrary commands as root on the machine of a client running port selfupdate against the mirror.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:macports:macports:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*

History

29 Jul 2025, 19:26

Type Values Removed Values Added
First Time Apple
Apple macos
Macports
Macports macports
Summary
  • (es) Un espejo MacPorts malintencionado o comprometido puede ejecutar comandos arbitrarios como superusuario en la máquina de un cliente que ejecuta la actualización automática de puertos contra el espejo.
CPE cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:a:macports:macports:*:*:*:*:*:*:*:*
References () https://github.com/google/security-research/security/advisories/GHSA-2j38-pjh8-wfxw - () https://github.com/google/security-research/security/advisories/GHSA-2j38-pjh8-wfxw - Exploit, Vendor Advisory

07 Jan 2025, 16:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.8

07 Jan 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-07 15:15

Updated : 2025-07-29 19:26


NVD link : CVE-2024-11681

Mitre link : CVE-2024-11681

CVE.ORG link : CVE-2024-11681


JSON object : View

Products Affected

apple

  • macos

macports

  • macports
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')