We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-55950

Tabby has a TCC Bypass via Unnecessary Permissive Entitlements in Tabby



Description

Tabby (formerly Terminus) is a highly configurable terminal emulator. Prior to 1.0.216, Tabby terminal emulator contains overly permissive entitlements that are unnecessary for its core functionality and plugin system, creating potential security vulnerabilities. The application currently holds powerful permissions including camera, microphone access, and the ability to access personal folders (Downloads, Documents, etc.) through Apple Events, while also maintaining dangerous entitlements that enable code injection. The concerning entitlements are com.apple.security.cs.allow-dyld-environment-variables and com.apple.security.cs.disable-library-validation. Since Tabby's plugins and themes are NodeJS-based without native libraries or frameworks, and no environment variables are used in the codebase, it is recommended to review and remove at least one of the entitlements (com.apple.security.cs.disable-library-validation or com.apple.security.cs.allow-dyld-environment-variables) to prevent DYLD_INSERT_LIBRARIES injection while maintaining full application functionality. This vulnerability is fixed in 1.0.216.

Reserved 2024-12-13 | Published 2024-12-26 | Updated 2024-12-27 | Assigner GitHub_M


HIGH: 8.6CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-276: Incorrect Default Permissions

Product status

< 1.0.216
affected

References

github.com/.../tabby/security/advisories/GHSA-jx33-9jc7-24gc

github.com/...ommit/e1e6e1cdab0310a881e36afd7c2744e5f905518b

cve.org (CVE-2024-55950)

nvd.nist.gov (CVE-2024-55950)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-55950

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.