CVE-2023-42920

7.8 HIGH

📋 TL;DR

This CVE describes a dylib hijacking vulnerability in FileMaker Pro and Claris Pro applications on macOS. Attackers can place malicious dynamic libraries in specific locations that the applications load, potentially executing arbitrary code. This affects macOS users running vulnerable versions of these applications.

💻 Affected Systems

Products:
  • FileMaker Pro.app
  • Claris Pro.app
Versions: Versions prior to the patched releases (specific versions not detailed in provided references)
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to place malicious dylib in writable location that application searches, typically requiring some level of local access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the application user, potentially leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation or arbitrary code execution in the context of the application user, allowing access to application data and limited system resources.

🟢

If Mitigated

Limited impact if applications run with minimal privileges and proper file system permissions prevent unauthorized library placement.

🌐 Internet-Facing: LOW - This is primarily a local attack vector requiring access to the target system.
🏢 Internal Only: MEDIUM - Internal attackers with local access could exploit this, but requires specific conditions and user interaction.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access to place malicious dylib and knowledge of application's library search paths. User may need to launch the application.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Latest versions from Claris/FileMaker (specific version numbers not provided in references)

Vendor Advisory: https://support.claris.com/s/article/FileMaker-Security-Information?language=en_US

Restart Required: Yes

Instructions:

1. Open FileMaker Pro or Claris Pro application. 2. Go to Help > Check for Updates. 3. Follow prompts to download and install latest version. 4. Restart the application after installation.

🔧 Temporary Workarounds

Restrict application library paths

macOS

Use macOS sandboxing or file system permissions to prevent writing to directories where application searches for dylibs

🧯 If You Can't Patch

  • Run applications with minimal user privileges to limit impact of successful exploitation
  • Monitor for suspicious dylib files in application directories and common hijacking locations

🔍 How to Verify

Check if Vulnerable:

Check FileMaker/Claris Pro version against latest patched version from vendor advisory

Check Version:

Open FileMaker Pro/Claris Pro > Go to FileMaker Pro/Claris Pro menu > About FileMaker Pro/Claris Pro

Verify Fix Applied:

Verify application version matches or exceeds patched version from vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Unexpected dylib loading events in application logs
  • File creation in application library directories

Network Indicators:

  • Unusual outbound connections from FileMaker/Claris processes post-launch

SIEM Query:

process.name:"FileMaker Pro" OR process.name:"Claris Pro" AND file.path:"*.dylib" AND event.action:"load"

🔗 References

📤 Share & Export