CVE-2024-11681

A malicious or compromised MacPorts mirror can execute arbitrary commands as root on the machine of a client running port selfupdate against the mirror.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:macports:macports:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*

History

29 Jul 2025, 19:26

Type Values Removed Values Added
Summary
  • (es) Un espejo MacPorts malintencionado o comprometido puede ejecutar comandos arbitrarios como superusuario en la máquina de un cliente que ejecuta la actualización automática de puertos contra el espejo.
First Time Apple
Macports
Macports macports
Apple macos
CPE cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:a:macports:macports:*:*:*:*:*:*:*:*
References () https://github.com/google/security-research/security/advisories/GHSA-2j38-pjh8-wfxw - () https://github.com/google/security-research/security/advisories/GHSA-2j38-pjh8-wfxw - Exploit, Vendor Advisory

07 Jan 2025, 16:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.8

07 Jan 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-07 15:15

Updated : 2025-07-29 19:26


NVD link : CVE-2024-11681

Mitre link : CVE-2024-11681

CVE.ORG link : CVE-2024-11681


JSON object : View

Products Affected

macports

  • macports

apple

  • macos
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')