Karol Mazurek

141 Followers
96 Following
88 Posts

The blog post about how #macOS stored authentication tokens in persistent file metadata via the kMDItemWhereFroms key after download.

https://afine.com/how-macos-file-metadata-exposed-authentication-tokens/

How macOS File Metadata Exposed Authentication Tokens - AFINE - digitally secure

macOS stored complete download URLs - including authentication tokens in persistent file metadata through the kMDItemWhereFroms.

AFINE - digitally secure

Short post about LPE and TCC Bypass on macOS through third-party apps bundled with Sparkle framework - a reminder of why XPC services should validate their clients.

https://afine.com/threats-of-unvalidated-xpc-clients-on-macos/

Threats of Unvalidated XPC Clients on macOS - AFINE - digitally secure

The article discusses vulnerabilities in the Sparkle framework on macOS, related to improper XPC client validation: CVE-2025-10015 and CVE-2025-10016.

AFINE - digitally secure
Shout out to Xeno Kovah for @OpenSecurityTraining2 "Vulnerabilities 1001 & 1002: C-Family Software Implementation Vulnerabilities" courses. I learned a ton. Many CVE examples are available for practice with clear guidance and explanations. Highly recommend it for vulnerability hunters and devs.

Since #Microsoft does not care, and the grace period is over, here is the Hardened Runtime bypass they introduced through .NET MAUI on #macOS. All applications built with it are vulnerable. The #vulnerability has existed probably since 2019.

https://afine.com/breaking-hardened-runtime-the-0-day-microsoft-delivered-to-macos/

Breaking Hardened Runtime: The 0-Day Microsoft Delivered to macOS - AFINE - digitally secure

Microsoft's .NET MAUI framework for macOS contains a vulnerability that bypasses the Hardened Runtime protection on macOS.

AFINE - digitally secure

Short post about why you should not distribute apps with `get-task-allow` through App Store and why #Apple should improve the distribution process.

https://afine.com/to-allow-or-not-to-get-task-allow-that-is-the-question/

To allow or not to get-task-allow, that is the question - AFINE - digitally secure

This article examines how the misconfigured get-task-allow entitlement in macOS apps enables code injection and TCC bypass.

AFINE - digitally secure

This post demonstrates how bugs aren't always what they seem, especially when working with a decompiled version of the code. Compiler optimization or decompiler artifacts can mask or "fix" high-level code issues. #Apple #macOS #iOS

https://afine.com/reverse-engineering-apples-tcc-daemon-when-decompiled-code-lies/

Reverse Engineering Apple’s TCC Daemon: When Decompiled Code Lies - AFINE - digitally secure

This post demonstrates how bugs aren't always what they seem. Compiler optimization or decompiler artifacts can mask or fix high-level code issues.

AFINE - digitally secure

#Phrack is much older than me, it is good to see it still doing so well, and an honour to be one of its authors in the 40th anniversary edition, which is now available online: https://phrack.org/issues/72/9_md#article

Thank you for what you are doing for our community. Long live the #Phrack!

.:: Phrack Magazine ::.

Phrack staff website.

Microsoft Visual Studio Code has a misconfiguration in its Electron setup that enables the “RunAsNode” fuse, letting attackers bypass TCC on macOS.

https://afine.com/tcc-bypass-in-microsoft-visual-studio-code-via-misconfigured-node-fuses/

It is probably the weirdest way I've found a stack overflow #vulnerability until now (patched in 15.6). Here is a blog post for those interested in #IOKit #macOS #kernel or #Apple Silicon #Exploit Development masochist looking for a target. Enjoy!
https://afine.com/a-mouse-move-that-crashed-the-system-stack-buffer-overflow-in-display-driver-on-macos/

An example of how plaintext credentials stored in memory can pose a threat.

https://afine.com/insecure-credential-storage-in-check-point-smartconsole-aka-cve-2024-24915/