vendor:
Dropbox
by:
cenobyte
7,2
CVSS
HIGH
Privilege Escalation
269
CWE
Product Name: Dropbox
Affected Version From: Dropbox 1.5.6
Affected Version To: Dropbox 3.3.*
Patch Exists: YES
Related CWE: N/A
CPE: a:dropbox:dropbox
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: OS X Yosemite (10.10.5)
2015
Dropbox FinderLoadBundle OS X local root exploit
The setuid root FinderLoadBundle that was included in older DropboxHelperTools versions for OS X allows loading of dynamically linked shared libraries that are residing in the same directory. The directory in which FinderLoadBundle is located is owned by root and that prevents placing arbitrary files there. But creating a hard link from FinderLoadBundle to somewhere in a directory in /tmp circumvents that protection thus making it possible to load a shared library containing a payload which creates a root shell.
Mitigation:
Upgrade to the latest version of DropboxHelperTools (3.4.* or later)