CVE-2024-23745

9.8 CRITICAL

📋 TL;DR

CVE-2024-23745 is a Dirty NIB attack vulnerability in Notion Web Clipper 1.0.3(7) where manipulated .nib files can execute arbitrary commands. Even with Gatekeeper enabled on macOS, modified applications may still run, allowing command execution within the application's context. This affects macOS users running the vulnerable Notion Web Clipper version.

💻 Affected Systems

Products:
  • Notion Web Clipper
Versions: 1.0.3(7)
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Vendor disputes this as a product-level vulnerability, citing it as an instance of CVE-2022-48505 (macOS signature caching issue).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via arbitrary command execution with application privileges, potentially leading to data theft, persistence, or lateral movement.

🟠

Likely Case

Local privilege escalation or arbitrary code execution within the application's sandbox/context, enabling data access or further exploitation.

🟢

If Mitigated

Limited impact if proper application sandboxing and file integrity controls prevent execution of modified files.

🌐 Internet-Facing: LOW - Requires local access or file manipulation; not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal attackers with local access could exploit this for privilege escalation or lateral movement.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access to manipulate .nib files and bypass Gatekeeper checks. Public proof-of-concept code is available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: N/A

Restart Required: No

Instructions:

No official patch available as vendor considers this a macOS caching issue (CVE-2022-48505) rather than a product vulnerability.

🔧 Temporary Workarounds

Disable or Remove Notion Web Clipper

macOS

Uninstall the vulnerable application to eliminate the attack surface.

sudo rm -rf /Applications/Notion\ Web\ Clipper.app

Enable Full Disk Access Restrictions

macOS

Use macOS Privacy & Security settings to restrict application access to sensitive areas.

🧯 If You Can't Patch

  • Implement application allowlisting to prevent execution of unauthorized/modified applications.
  • Use endpoint detection and response (EDR) tools to monitor for suspicious file modifications and process execution.

🔍 How to Verify

Check if Vulnerable:

Check if Notion Web Clipper version 1.0.3(7) is installed: ls -la /Applications/ | grep 'Notion Web Clipper'

Check Version:

mdls -name kMDItemVersion /Applications/Notion\ Web\ Clipper.app

Verify Fix Applied:

Verify application is removed or updated (though no patch exists). Check macOS system logs for Gatekeeper bypass attempts.

📡 Detection & Monitoring

Log Indicators:

  • Gatekeeper bypass logs in macOS Console
  • Unexpected execution of Notion Web Clipper with modified timestamps

Network Indicators:

  • Unusual outbound connections from Notion Web Clipper process

SIEM Query:

process_name:"Notion Web Clipper" AND (event_type:"process_execution" OR file_modification:".nib")

🔗 References

📤 Share & Export