An issue existed within the path validation logic for symlinks. This issue was addressed with improved path sanitization. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. A local attacker may be able to elevate their privileges.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ipados | Apple | * | 13.6 (excluding) |
Iphone_os | Apple | * | 13.6 (excluding) |
Mac_os_x | Apple | * | 10.15.6 (excluding) |
Tvos | Apple | * | 13.4.8 (excluding) |
Watchos | Apple | * | 6.2.8 (excluding) |