SecureMac Issues Critical Security Advisory for MacKeeper Users

LOS ANGELES — Apple Macintosh and Mac OS X security specialists SecureMac, has issued a critical security advisory for users of the OS X utility program MacKeeper.

According to SecureMac, a flaw in MacKeeper’s URL handler implementation allows arbitrary remote code execution when a user visits a specially crafted webpage. MacKeeper was originally created by Ukrainian company ZeoBIT, and is now distributed by Kromtech Alliance Corp.

Security researcher Braden Thomas discovered the flaw, caused by MacKeeper’s lack of input validation when executing commands using its custom URL scheme, enabling commands to be run as “root” with little to no user interaction required.

Thomas published a proof-of-concept (POC) that demonstrates how using Safari to visit a specially coded webpage causes the affected system to execute various commands, which in the case of the POC, will uninstall MacKeeper.

SecureMac notes that while the POC is relatively benign, the source code provided with it could easily be modified to perform malicious attacks.

“If MacKeeper has already prompted the user for their password during the normal course of the program’s operation, the user will not be prompted for their password prior to the arbitrary command being executed as root,” explains a SecureMac spokesperson. “If the user hasn’t previously authenticated, they will be prompted to enter their username and password — however, the text that appears for the authentication dialog can be manipulated as part of the exploit and set to anything, so the user might not realize the consequences of this action.”

As with other operating systems, Apple allows OS X and iOS apps to define custom URL schemes and register them with the operating system so that other programs know which app should handle the custom URL scheme.

“Normally, this is used to define a custom communication protocol for sending data or performing a specific action (for example, clicking a telephone number link in iOS will ask if the user wants to dial that number, or clicking an email address link in OS X will open Mail.app and compose a new message to that person),” the spokesperson adds. “Apple’s inter-application programming guide explicitly tells developers to validate the input received from these custom URLs in order to avoid problems related to URL handling. Additionally, Apple has provided information on the importance of input validation in their Secure Coding Guide.”

It appears that these security guidelines were ignored.

According to MacKeeper, its software has surpassed 20 million downloads worldwide, but despite this popularity, reports from users have cited its numerous pop-ups and advertisements as major negatives, and it remains to be seen how this latest revelation will affect its users.

A workaround is available for MacKeeper users until this vulnerability in the program is fixed: On OS X, clicking a link in Safari that uses a custom URL scheme will automatically open the program that is registered to handle that type of URL. Other browsers, such as Google’s Chrome, will ask the user for permission before opening a link that uses an external protocol. Non-technical users could use a web browser other than Safari, in order to see an alert before a link could cause an arbitrary command to be executed, while more technical users could remove the custom URL scheme handler from MacKeeper’s Info.plist file.

For more information, visit SecureMac.com.

Related:  

Copyright © 2025 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More News

Ofcom Investigates More Sites in Wake of AV Traffic Shifts

U.K. media regulator Ofcom has launched investigations into 20 more adult sites as part of its age assurance enforcement program under the Online Safety Act.

MintStars Launches Debit Card for Creators

MintStars has launched its MintStars Creator Card, powered by Payy.

xHamster Settles Texas AV Lawsuit, Pays $120,000

Hammy Media, parent company of xHamster, has settled a lawsuit brought by the state of Texas over alleged noncompliance with the state’s age verification law, agreeing to pay a $120,000 penalty.

RevealMe Joins Pineapple Support as Partner-Level Sponsor

RevealMe has joined the ranks of over 70 adult businesses and organizations committing funds and resources to Pineapple Support.

OnlyFans Institutes Criminal Background Checks for US Creators

OnlyFans will screen creators in the United States for criminal convictions, CEO Keily Blair has announced in a post on LinkedIn.

Pineapple Support to Host 'Healthier Relationships' Support Group

Pineapple Support is hosting a free online support group on enhancing connection and personal growth.

Strike 3 Rejects Meta 'Personal Use' Defense in AI Suit

Vixen Media Group owner Strike 3 Holdings this week responded to Facebook parent company Meta’s motion to dismiss Strike 3’s suit accusing Meta of pirating VMG content to train its artificial intelligence models.

Pornhub, Stripchat: VLOP Designation Based on Flawed Data

In separate cases, attorneys for Pornhub and Stripchat this week told the EU’s General Court that the European Commission relied on unreliable data when it classified the sites as “very large online platforms” (VLOPs) under the EU’s Digital Services Act, news organization MLex reports.

New Age Verification Service 'AgeWallet' Launches

Tech company Brady Mills Agency has officially launched its subscription-based age verification solution, AgeWallet.

AEBN Publishes Popular Searches for September, October

AEBN has published the top search terms for the months of September and October from its straight and gay theaters in all 50 states and the District of Columbia.

Show More