Exploitation Summary
EIP tracks 1 public exploit for CVE-2020-27935. PoCs published by LIJI32.
AI-analyzed exploit summary This repository contains a working proof-of-concept exploit for CVE-2020-27935, a sandbox escape vulnerability in macOS up to version 10.15 and early beta versions of macOS 11.0. The exploit leverages Objective-C runtime manipulation to execute code before sandbox initialization, allowing access to files outside the sandbox.
Description
Multiple issues were addressed with improved logic. This issue is fixed in iOS 14.2 and iPadOS 14.2, macOS Big Sur 11.0.1, watchOS 7.1, tvOS 14.2. A sandboxed process may be able to circumvent sandbox restrictions.
Exploits (1)
This repository contains a working proof-of-concept exploit for CVE-2020-27935, a sandbox escape vulnerability in macOS up to version 10.15 and early beta versions of macOS 11.0. The exploit leverages Objective-C runtime manipulation to execute code before sandbox initialization, allowing access to files outside the sandbox.
References (4)
Scores
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N