CVE-2024-11681

A malicious or compromised MacPorts mirror can execute arbitrary commands as root on the machine of a client running port selfupdate against the mirror.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:macports:macports:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*

History

29 Jul 2025, 19:26

Type Values Removed Values Added
CPE cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:a:macports:macports:*:*:*:*:*:*:*:*
References () https://github.com/google/security-research/security/advisories/GHSA-2j38-pjh8-wfxw - () https://github.com/google/security-research/security/advisories/GHSA-2j38-pjh8-wfxw - Exploit, Vendor Advisory
Summary
  • (es) Un espejo MacPorts malintencionado o comprometido puede ejecutar comandos arbitrarios como superusuario en la máquina de un cliente que ejecuta la actualización automática de puertos contra el espejo.
First Time Apple
Macports macports
Apple macos
Macports

07 Jan 2025, 16:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.8

07 Jan 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-07 15:15

Updated : 2025-07-29 19:26


NVD link : CVE-2024-11681

Mitre link : CVE-2024-11681

CVE.ORG link : CVE-2024-11681


JSON object : View

Products Affected

apple

  • macos

macports

  • macports
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')