1.3 KiB
1.3 KiB
Source: https://twitter.com/lemiorhan/status/935578694541770752 & https://forums.developer.apple.com/thread/79235
"Dear @AppleSupport, we noticed a HUGE security issue at MacOS High Sierra. Anyone can login as "root" with empty password after clicking on login button several times. Are you aware of it @Apple?"
Proof: https://twitter.com/patrickwardle/status/935608904377077761
Mitigation/Detection/Forensic: https://news.ycombinator.com/item?id=15800676
- Can be mitigated by enabling the root user with a strong password
- Can be detected with
osquery
usingSELECT * FROM plist WHERE path = "/private/var/db/dslocal/nodes/Default/users/root.plist" AND key = "passwd" AND length(value) > 1;";
- You can see what time the root account was enabled using
SELECT * FROM plist WHERE path = "/private/var/db/dslocal/nodes/Default/users/root.plist" WHERE key = "accountPolicyData";
then base 64 decoding that into a file and then runningplutil -convert xml1
and looking at thepasswordLastSetTime
field. Note: osquery needs to be running withsudo
but if you have it deployed across a fleet of macs as a daemon then it will be running withsudo
anyway. Note: You can get the same info with plutil(1):$ sudo plutil -p /private/var/db/dslocal/nodes/Default/users/root.plist