Pritunl Client Local Privilege Escalation via File Manipulation on macOS
Pritunl Client versions before 1.3.4220.57 have a privilege escalation vulnerability. An administrator with access to /Applications can exploit this issue after uninstalling the product. By inserting a new file at the pathname of the removed pritunl-service file, the administrator can cause the file to be executed by a LaunchDaemon with root privileges.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
pritunl pritunl-client |