{ "id": "CVE-2024-55950", "sourceIdentifier": "security-advisories@github.com", "published": "2024-12-26T22:15:17.817", "lastModified": "2024-12-27T17:15:08.480", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tabby (formerly Terminus) is a highly configurable terminal emulator. Prior to 1.0.216, Tabby terminal emulator contains overly permissive entitlements that are unnecessary for its core functionality and plugin system, creating potential security vulnerabilities. The application currently holds powerful permissions including camera, microphone access, and the ability to access personal folders (Downloads, Documents, etc.) through Apple Events, while also maintaining dangerous entitlements that enable code injection. The concerning entitlements are com.apple.security.cs.allow-dyld-environment-variables and com.apple.security.cs.disable-library-validation. Since Tabby's plugins and themes are NodeJS-based without native libraries or frameworks, and no environment variables are used in the codebase, it is recommended to review and remove at least one of the entitlements (com.apple.security.cs.disable-library-validation or com.apple.security.cs.allow-dyld-environment-variables) to prevent DYLD_INSERT_LIBRARIES injection while maintaining full application functionality. This vulnerability is fixed in 1.0.216." }, { "lang": "es", "value": "Tabby (anteriormente Terminus) es un emulador de terminal altamente configurable. Antes de la versi\u00f3n 1.0.216, el emulador de terminal Tabby contiene permisos excesivamente permisivos que son innecesarios para su funcionalidad principal y sistema de complementos, lo que crea posibles vulnerabilidades de seguridad. La aplicaci\u00f3n actualmente tiene permisos poderosos que incluyen acceso a la c\u00e1mara, al micr\u00f3fono y la capacidad de acceder a carpetas personales (Descargas, Documentos, etc.) a trav\u00e9s de Apple Events, al mismo tiempo que mantiene permisos peligrosos que permiten la inyecci\u00f3n de c\u00f3digo. Los permisos en cuesti\u00f3n son com.apple.security.cs.allow-dyld-environment-variables y com.apple.security.cs.disable-library-validation. Dado que los complementos y temas de Tabby est\u00e1n basados en NodeJS sin librer\u00edas o marcos nativos y no se utilizan variables de entorno en el c\u00f3digo base, se recomienda revisar y eliminar al menos uno de los derechos (com.apple.security.cs.disable-library-validation o com.apple.security.cs.allow-dyld-environment-variables) para evitar la inyecci\u00f3n de DYLD_INSERT_LIBRARIES y, al mismo tiempo, mantener la funcionalidad completa de la aplicaci\u00f3n. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 1.0.216." } ], "metrics": { "cvssMetricV40": [ { "source": "security-advisories@github.com", "type": "Secondary", "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "baseScore": 8.6, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "NONE", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnAvailabilityImpact": "HIGH", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "subAvailabilityImpact": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirement": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "Safety": "NOT_DEFINED", "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" } } ] }, "weaknesses": [ { "source": "security-advisories@github.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-276" } ] } ], "references": [ { "url": "https://github.com/Eugeny/tabby/commit/e1e6e1cdab0310a881e36afd7c2744e5f905518b", "source": "security-advisories@github.com" }, { "url": "https://github.com/Eugeny/tabby/security/advisories/GHSA-jx33-9jc7-24gc", "source": "security-advisories@github.com" }, { "url": "https://github.com/Eugeny/tabby/security/advisories/GHSA-jx33-9jc7-24gc", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] }