vendor:
Arq
by:
m4rkw
7.8
CVSS
HIGH
Privilege Escalation
269
CWE
Product Name: Arq
Affected Version From: Arq <= 5.10
Affected Version To: Arq <= 5.10
Patch Exists: YES
Related CWE: N/A
CPE: a:arqbackup:arq
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: macOS
2020
Arq <= 5.10 local root privilege escalation exploit
This exploit is used to gain root privileges on Arq <= 5.10. It works by exploiting a vulnerability in the Arq Agent application, which is used to perform auto-updates. The exploit involves copying the Arq application to a user's home directory, compiling a payload, backing up the original files, and then installing the payload. Once the payload is installed, the exploit is triggered by opening the Arq Agent application, which will then execute the payload and gain root privileges.
Mitigation:
Disable auto-updates for Arq and ensure that the application is up to date.