CVE-2020-15349
📋 TL;DR
ForkLift 3.x before version 3.4 has a local privilege escalation vulnerability where the privileged helper tool's XPC interface allows any process to perform file operations (copy, move, delete) as root and change permissions. This affects macOS users running ForkLift file manager versions 3.0 through 3.3.9.
💻 Affected Systems
- BinaryNights ForkLift
📦 What is this software?
Forklift by Binarynights
⚠️ Risk & Real-World Impact
Worst Case
An attacker with local access could gain root privileges, modify system files, install persistent malware, or access sensitive data across the system.
Likely Case
Malicious local user or malware could escalate privileges to root, allowing unauthorized file modifications, data theft, or persistence mechanisms.
If Mitigated
With proper access controls and monitoring, impact is limited to local users who already have some level of access to the system.
🎯 Exploit Status
Exploitation requires local access but is relatively straightforward once local access is obtained. The XPC interface is improperly secured.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.4 and later
Vendor Advisory: https://binarynights.com/blog/posts/forklift-3-4-security-update.html
Restart Required: No
Instructions:
1. Open ForkLift application. 2. Go to ForkLift menu > Check for Updates. 3. Install version 3.4 or later. 4. Alternatively, download directly from binarynights.com.
🔧 Temporary Workarounds
Uninstall ForkLift
macOSRemove ForkLift completely to eliminate the vulnerability
sudo rm -rf /Applications/ForkLift.app
sudo rm -rf ~/Library/Application\ Support/ForkLift
sudo rm -rf /Library/PrivilegedHelperTools/com.binarynights.ForkLiftHelper
Disable ForkLift Helper Tool
macOSRemove the privileged helper tool while keeping ForkLift installed
sudo rm -f /Library/PrivilegedHelperTools/com.binarynights.ForkLiftHelper
sudo launchctl unload /Library/LaunchDaemons/com.binarynights.ForkLiftHelper.plist
🧯 If You Can't Patch
- Restrict local user access to systems with vulnerable ForkLift versions
- Implement strict privilege separation and monitor for suspicious file operations by non-root users
🔍 How to Verify
Check if Vulnerable:
Check ForkLift version in application or run: defaults read /Applications/ForkLift.app/Contents/Info.plist CFBundleShortVersionString
Check Version:
defaults read /Applications/ForkLift.app/Contents/Info.plist CFBundleShortVersionString
Verify Fix Applied:
Verify version is 3.4 or higher and check that helper tool exists: ls -la /Library/PrivilegedHelperTools/com.binarynights.ForkLiftHelper
📡 Detection & Monitoring
Log Indicators:
- Unusual file operations by non-root users in system directories
- Privilege escalation attempts in system logs
- Unexpected processes running as root
Network Indicators:
- Not applicable - local vulnerability
SIEM Query:
process where parent_process_name contains 'ForkLift' and effective_user contains 'root'