Hacker News

Powered by HN Search API

macOS High Sierra: Anyone can login as “root” with empty password

From https://twitter.com/lemiorhan/status/935578694541770752
vladikoff | 2017-11-28 | 3001

Comments:

josho

2017-11-28
Confirmed that root with no password unlocks the preferences pane. But, changing the require password after screen saver setting doesn't take effect. So, it seems to be a bug in the UI not an actual vulnerability.

edit: I stand corrected. The 'require password' setting under Security Preferences didn't change, but other settings do. Yikes

afiler

2017-11-28
Even on El Capitan, I was able to unlock with "root" on my first try. From there, I could add a new admin user. This seems... not good.

joe_hills

2017-11-28
I just tested this on a Sierra (10.12.6) machine, and verified this bug isn't present in that earlier OSX version.

hartator

2017-11-28
I guess they were more focused in introducing bugs and less performant filesystem than security in High Sierra.

Shank

2017-11-28
With user switching enabled as a username + password combo, I was able to login to the root account from the login screen with no password on 10.13.1. It's not just a UI bug, it's a full on authentication bypass.

donatj

2017-11-28
I can't seem to reproduce it locally. 10.13.1… Anyone else having issues?

I've upgraded a through a couple versions of OS X on this machine - maybe that makes a difference?

notanai

2017-11-28
Can this be used remotely? Edit: Yes, after turning on Remote Management on my second mac I was able to log into it using Remote Desktop, account root and no pw. It only works after getting physical access once.

mratzloff

2017-11-28
Wow. As if I needed another reason to never "upgrade" to High Sierra...

tombrossman

2017-11-28
Fellow Linux users, please keep the snark in this thread to a minimum. Here's just one recent example why, there are more: http://www.omgubuntu.co.uk/2017/05/ubuntu-guest-sessions-log...

myth_buster

2017-11-28
Is social media the goto for reporting security vulnerabilities in 2017?

If I remember correctly, one is supposed to make it public once patched or in event of no response, no?

Edit: What is "Responsible Disclosure"[0]?

[0] https://en.wikipedia.org/wiki/Responsible_disclosure

pmoriarty

2017-11-28
Has no one been running password crackers against OSX this whole time?

notanai

2017-11-28
You can just type root in the login window to get System administrator access.

jmuguy

2017-11-28
Time to install Afterdark on all the computers in the Apple store. Confirmed here, 10.13.1.

michaelmcmillan

2017-11-28
Are we really ready for self-driving cars? https://www.youtube.com/watch?v=4G1Boh-URIM

mrkstu

2017-11-28
verified on latest build of 10.13.1 (17B48).

anon1253

2017-11-28
wat. confirmed on 10.13.1 (17B48). I was even able to add another super user.

Edit: changing the login method to "Name and password" under login options, then logout and login with "root" with empty password also works.

Fortunately, it doesn't work on cold boot with FileVault enabled, at least it doesn't appear so. `sudo su root` also doesn't work with an empty password.

valine

2017-11-28
This is deeply troubling. How does this even happen?

fredsted

2017-11-28
This is very, very bad.

patcheudor

2017-11-28
Apple makes it pretty easy to report vulnerabilities to:

product-security@apple.com

They also respond to security@apple.com but prefer the product-security address.

Further, there are any number of legit bug bounty programs out there like ZDI that would pay for a bug like this then immediately disclose to Apple for it to be fixed.

Disclosing an 0Day root authentication bypass vulnerability on Twitter isn't cool, even if it is local: think of the impact to shared iMacs on university campuses.

overcast

2017-11-28
Excuse my language, but this was a dick move to post this publicly, especially on Twitter. Go through private bug channels properly for something as serious as this. Of course doing it that way doesn't give you your 15 minutes of interweb fame.

Unknoob

2017-11-28
Confirmed here on 10.13

jcoby

2017-11-28
Be careful testing this! It appears that you're creating a "root" superuser with no password. Be sure to clean up that user afterwords.

https://twitter.com/a_hailes/status/935601901839806464

sillysaurus3

2017-11-28
This is the first time I've felt happy I rarely upgrade.

quicklime

2017-11-28
Anyone else think it was a bad idea to disclose this so publicly over Twitter? I thought that the usual practice was to let the development team know first.

cmurf

2017-11-28
I can't reproduce this on a clean 10.13.1 (17B48) system, either at the login window or an authentication dialog.

Update: And even after attempting it, checking Directory Utility the root user is still disabled. So I wonder if something 3rd party has enabled the root user and left it passwordless.

srathi

2017-11-28
Confirmed on 10.13. I was even able to add a user as an administrator after unlocking with root.

tzakrajs

2017-11-28
Can't reproduce on multiple High Sierra machines.

nathancahill

2017-11-28
Fix this by setting a password for root (or disable).

Instructions here: https://support.apple.com/en-us/HT204012

kylehotchkiss

2017-11-28
Does this bypass filesystem encryption?

adambull

2017-11-28
Confirmed on 10.13.1. As a workaround, once you login as "root", you can change the password to something else, and the empty password will stop working.

equivocates

2017-11-28
So — if you log out and log in as root without a password (EEK!), you can set your own password as root. Once you do, Mac os will no longer bypass the password.

dyavuz

2017-11-28
In the meantime, if you'd like to protect your mac, you can set a password for root by going to:

System Preferences > Users & Groups > Login Options > Join > Open Directory Utility > Edit > Change Root Password

ianmcgowan

2017-11-28
Confirming this works, both from preferences, as well as from the main login screen

It seems like root has no password by default. Setting one is enough to close the hole. This is unbelievable!

Curious to see what's in /var/db/dslocal/nodes/Default/users/root.plist before trying this.

cortesoft

2017-11-28
Does this effect people who already have a root user with a password set up?

Asmod4n

2017-11-28
Works with "su - root" too in a Terminal.

zaro

2017-11-28
Classical click and bait title. First promises that you'll become a hacker, and then when you actually click the tweet is deleted.

pilif

2017-11-28
A quick mitigation workaround: If you follow the steps here https://support.apple.com/en-us/HT204012 to disable the root account until the point where you open and authenticate the Directory Utility, in the Edit menu there's a "Change Root Password" option.

Set a good password there and disable the root account again.

Now people making use of this vulnerability will still be able to re-enable the root account (that's why it fail the first time - root is default off, but this bug enables it), but now there will at least be a useful password set.

sccxy

2017-11-28
I wouldn't have thought that NSA backdoors are so simple

estevaovix

2017-11-28
The solution for now is to set a passwd for root... this is ridiculous

mikeash

2017-11-28
For those who can't make it happen, it requires that the root account is disabled, which is the default. If you already enabled the root account for some other reason (which apparently I had on one of my Macs, although I don't know why) then that prevents it from working.

It seems like the best mitigation for the moment might be to enable the root user and set a password for it.

zaro

2017-11-28
Wow. This is fun. I remember my Windows98 had the same feature. You just use Administrator with empty password and you're in. Apple is finally catching up.

dwighttk

2017-11-28
I mean, I only tried 15 times, I don't know if that counts as "several" but this doesn't work for me.

It looks to me like my root user is disabled.

When I type "root" into the username field and click unlock (in System Preferences > Users & Groups) "root" is replaced with my username and the dialog shakes... I have to type root in each time, but it never unlocks. 10.13.1

Edit: trying it after logging out keeps "root" in the username field, but never logs me in... tried 20+ times

lanius

2017-11-28
Good thing I haven't updated yet. I wonder how many machines are vulnerable?

steeleduncan

2017-11-28
To workaround this before Apple have had a chance to patch it(thanks @lemiorhan), it seems you can:

- Open Directory Utility (/System/Library/CoreServices/Applications/Directory Utility.app)

- Authenticate with the lock icon

- From the Edit menu you can enable the root user and set a proper password (it would already be enabled if you had tried out the exploit)

Having that root user enabled isn't great overall, so it would be best to set a reminder to disable it using the same Directory Utility app once the security hole is patched.

singularity2001

2017-11-28
Is http://hckrnews.com/ buckling from the tremendous traffic this issue generates?

rubatuga

2017-11-28
While this true, please keep in mind that rebooting your Mac into single user mode also allows anybody to login as root

2trill2spill

2017-11-28
Apple has a serious software quality problem. Last night I was helping a friend with their computer. Safari couldn't even render apples website correctly. Nor could Safari connect to any site with HTTPS. Installed FireFox and HTTPS sites worked and apples's site renders. But the submit button on their developer site is broken[1]. Mail on my Mom's fully updated laptop crashes every time it's opened. Once I reported a bug in ptrace like 4 years ago and no response yet. Also the archive utility fails often to extract tar files that the tar command has no problem extracting at all. Quicktime can't play most videos, etc, etc. And now shipping an operating system with a root account with no password by default.

Come on Apple you have a quarter trillion dollars in the bank why don't you spend some on improving your software.

[1]: https://forums.developer.apple.com/thread/60763

swat535

2017-11-28
This is comical at this point. I have no idea how such vulnerable software makes it to production.

It is really ironic that a company, making billions of dollars and branding itself as the leaders of quality, stability and so on, to have this kind of vulnerability.

I have truly lost faith in Apple.

gaius

2017-11-28
But someone at Apple got their bonus for shipping the animated poop icon in time for this release.

romanovcode

2017-11-28
Who needs security when we have animoji!

mholt

2017-11-28
The HN title is wrong. This reportedly affects High Sierra, not Sierra.

brucepucci

2017-11-28
To fix this with a workaround open Terminal.app and run the command "sudo passwd" to set a password. Can't believe this is happening.

mirekrusin

2017-11-28
Maybe NSA asked for an easy access. Apple is generally good at making things simple for users.

dasil003

2017-11-28
Why is this so far down the front page? Are people flagging it for some reason?

jeffisabelle

2017-11-28
I still can't believe more people complain about this being publicly disclosed than this being possible in the first place. No one is obligated to know the procedures on InfoSec 0-days and follow those steps.

manwe150

2017-11-28
I'm on Sierra and haven't been able to reproduce. But does anyone know if it respects pam.d "nullok" and I could just delete that option?

    /etc/pam.d$ grep -RI nullok /etc/pam.d
    /etc/pam.d/authorization:auth       required       pam_opendirectory.so use_first_pass nullok
    /etc/pam.d/checkpw:auth       required       pam_opendirectory.so use_first_pass nullok
    /etc/pam.d/screensaver:auth       required       pam_opendirectory.so use_first_pass nullok

tempodox

2017-11-28
On my system, the trick doesn't work. But then, I did explicitly set a non-empty root password.

TonnyGaric

2017-11-28
Not cool to disclose this kind of bug on Twitter.

arghwhat

2017-11-28
It seems to activate the root user with an empty password if you try, as an admin user, to use "root"/"" as credentials in a System Preferences authentication prompt.

It does not work if you are not admin. It does not work if your root user is enabled and has a password set. If you tried the vuln, you should set a password for the root user ("sudo passwd root").

thesephist

2017-11-28
Encouraging users to "try it" is dangerous here. Recreating the bug enables root user across the system, and most users won't know how to disable it.

TechCrunch, if you're reading this... please discourage people from reproducing the bug.

AdamJacobMuller

2017-11-28
Wow, setting a root password seems to fix this...

jonny_eh

2017-11-28
Looks like changing root’s password blocks the exploit but if you disable the root user, it re-enables the exploit.

Protect yourself by changing root’s password: ⌘ (Command) + Space, Directory Utility, click the lock and enter your password, Edit -> Change Root Password…, then do NOT disable Root User.

Or open a terminal and do:

    sudo passwd

nkrisc

2017-11-28
I don't know much about OS development but isn't this just the sort of thing you'd automate testing for?

_jomo

2017-11-28
Current workaround / fix:

1) open Directory Utility app (via Spotlight or other) 2) Click lock to make changes, log in with admin account 2) Click Edit -> Enable Root User 3) Click Edit -> Change Root Password… 4) Set a password 5) Do NOT disable root user!

If you disable the root user, the admin prompt will create it again with an empty password.

callesgg

2017-11-28
In what version did the issue appear?

fiatpandas

2017-11-28
Worked for me on the second try (10.13.1)

senko

2017-11-28
Am I missing something or does this require the attacker to have access to an unlocked computer? In which case all bets are off anyways.

tekacs

2017-11-28
Now that this is public, it's likely worth passing this message on to non-technical folks too (e.g. share this or write a similar post - this is my only public post):

https://www.facebook.com/amar.sood/posts/10209545863036116

bsaul

2017-11-28
I wonder who they're going to ask to write a public letter of apology this time.

This isn't just a snarky comment. They have just released the most awfull iOS upgrade for a long time, and now this. Something's messed up, and they better fix it soon.

I've think i've read somewhere they merged the iOS and macOS teams, i suppose the wrong people were promoted during the operation.

sizzzzlerz

2017-11-28
Fortunately, I'm OK. The latest OS upgrade failed to install and bricked my computer so that no one could log in, let alone root. I was able to restore it using Time Machine but I don't think I'll go through that exercise again for a while yet.

mcintyre1994

2017-11-28
I'm sure many of us can often see how some kinds of bugs managed to slip through testing/QA, but this is crazy to me given it works on the login screen if it's happening for everyone on whatever version: is "user cannot log in as root when root account is disabled" not a test case? That seems.. insane?

nerflad

2017-11-28
I didn't think the BSD's allowed a blank root password.

TrueSelfDao

2017-11-28
Serious 0-day on Twitter. How exciting!

bennyg

2017-11-28
Reminds me of an exploit back in 10.7 where you could create a new admin privileged user from a non-admin account using some bash commands. Used that to add Xcode to my work computer at college so I could fool around with learning how to code when I was at work.

realworldstuff

2017-11-28
People going on about responsible disclosure when this is such a gross violation of CUSSE: https://web.archive.org/web/20170712120031/http://www.cusse....

aezell

2017-11-28
Should I leave my Mac unattended until this is resolved?

tomduncalf

2017-11-28
I wonder what is going on with software quality and testing at Apple. It feels like recently there have been quite a few issues like this (the FileVault password bug, numerous issues with iOS 11, the issue that totally broke iOS Safari a couple of years ago) which should have been fairly easily caught, especially given the limited range of devices their software runs on.

I know testing is hard, but a company with Apple’s resources shouldn’t be making slip ups like this. It suggests some real issues such as lack of unit/automated tests and/or sufficient release testing, which pretty urgently need addressing.

Anyone got any inside scoop?

mrkd

2017-11-28
Title should be changed to 'macOS'

I initially saw this thinking it didn't affect Sierra or High Sierra.

quotha

2017-11-28
I tried it anyway and it does not work! I'm running version 10.13.1

sugavaneshb

2017-11-28
*macOS High Sierra

FiveSquared

2017-11-28
Oh my goodness. I have a High Sierra MBP. I am scared right now BADLY

abritishguy

2017-11-28
If you have `osquery` deployed to your fleet you can detect compromise with this query:

SELECT * FROM plist WHERE path = "/private/var/db/dslocal/nodes/Default/users/root.plist" AND key = "passwd" AND length(value) > 1;

danra

2017-11-28
These bugs are getting ridiculous. With Apple's budget, finding such bugs in a security architecture review or just in QA should be as easy as 1+2+3.

raydev

2017-11-28
I've been a developer for a long time. I understand bugs happen, even bugs with terrible consequences. A lot of bugs seem understandable, like I can see the chain of ifs/thens required to end up at some hilarious broken state.

But I'm breaking my brain trying to figure out how in the hell a login attempt for "root" will enable it if it's disabled. Why is this is a possibility, to just enable root, no questions asked?

alexwebb2

2017-11-28
I asked this in the other thread, but... does anyone know how big of a bounty the guy missed by not disclosing this responsibly?

I'm guessing it probably would've been a fairly big chunk of change.

cm2187

2017-11-28
It really feels like the only thing that made Apple to be less prone to hacking and malware (and therefore more secure) than other OS is the lack of scrutiny by hackers and malware authors. This is a front door open kind of problem.

Stephen-E

2017-11-28
While reading this, my mac just prompted me to Upgrade to High Sierra. I think I'll hold off...

thought_alarm

2017-11-28
This will be a fun fix.

They'll not only have to patch the vulnerability but they'll also have to disable all of the root accounts that were inadvertently enabled. What a mess.

Welytech

2017-11-28
Dope

symlinkk

2017-11-28
How can one of the most wealthy companies on the planet, that every single software engineer would kill to work for, manage to have a bug like this?

Maybe they need to re-think their hiring process, because clearly something is not working as it should.

buryat

2017-11-28
AWS ReInvent 2017 is going right now in Las Vegas, the number of attendees is about 40000, and I'm wondering how many laptops can be attacked using this technique. The `root` user stays in the system, so one just need to create it and open SSH quickly, and later they can do whatever they please.

mfrw

2017-11-28
I may not be an apple fanboy, but I admit, I really miss Jobs, and his commitment to quality. Apple has just been minting money and forgot all about its core values.

taurath

2017-11-28
This is near Windows-95 levels of bad - at the very least you need to already be logged in

lostgame

2017-11-28
#whyidontupgrade

Until Apple forces me to with a required xCode update for the newest iOS SDK...>.>

mrmondo

2017-11-28
1. Ensure you always have FileVault enabled (you should regardless) and shutdown after work until the bug is fixed.

2. Add a complex root passphrase and clean this up after the fix is released.

3. Reflect on how irresponsibly this serious security bug was ‘reported’, he didn’t just potentially miss out on $200,000, he put an enormous number of people at risk of local intrusions when instead if it was properly reported there’s a good chance Apple would have released a bug fix for this quicker thus reducing the potential impact and spread of misinformation.

https://en.m.wikipedia.org/wiki/Responsible_disclosure

https://support.apple.com/en-au/HT201220 (See ‘Security and privacy researchers’)

perfectstorm

2017-11-28
What's going on with Apple's QA team ? Here's another serious bug that I came across:

I've two factor authentication on my Apple account and now every time I use a new browser (or after clearing the Cache) and try to log into one of the Apple developer sites it sends me the authentication code to the same machine that I'm using. How is that two factor ?

I've an iPhone which is connected to the same account but it's not my primary phone so it's most likely not ON when I do this. I guess Apple tries to send the code to my phone and when it fails sends to the next online device which happens to be the same machine I'm using to log in. So all I have to do is click Allow and enter the 6 digit code which is displayed in a different app.

nkkollaw

2017-11-28
The new Apple is the old Microsoft, and the new Microsoft is the old Apple.

After 8 months of living hell using their overpriced MacBook Pro, I'm moving to Surface Pro (running Xubuntu, though).

k4ch0w

2017-11-28
I just have no words, it seems intentional. They may want to review their build pipeline to check someone didn't manipulate the source code before it was signed. I haven't seen an easy root priv-esc like this in a long while.

lolc

2017-11-28
Reminds me of the time Mac OS X would trust any NIS server in the local net to authenticate local root. Can't find the story though. Did that even happen?

tribune

2017-11-28
I would say I'm surprised such a serious bug made it out, but after the A � thing who knows what's going on at Apple

thanatropism

2017-11-28
Anyone in a position to short AAPL? It's apparently 6bps up in after hours trading but that's very low liquidity.

https://finance.yahoo.com/quote/AAPL?p=AAPL

A higher risk, higher leverage bet: buy some put options the milisecond markets open:

http://www.nasdaq.com/symbol/aapl/option-chain

thrusong

2017-11-28
There have been some really horrible bugs at Apple lately. I'm still waiting on them to patch the camera bug in iOS 11 where if you try to use the camera in a web app pinned to the home screen, it shows the camera UI on a black screen. This dates back to June. How can it be that hard to patch such a glaring and embarrassing problem?

MagerValp

2017-11-28
To block this, set a random password for root:

sudo dscl . -passwd /Users/root $(uuidgen)

mcintyre1994

2017-11-28
I guess Apple aren't the kind of company that would do it, but I'd love to read a frank post mortem about how this happened.

DonHopkins

2017-11-28
They could have at least used "rms" instead of a blank password.

https://www.reddit.com/r/linux/comments/7hj6v/i_use_my_login...

llamataboot

2017-11-28
That twitter thread and lots of the comments are missing the point. MANY people don't know about what the ethics of reporting vulnerabilities are, they just want to say something and get it fixed. yes, it probably would have been better if this person had gone through proper channels, but there's no evidence they did it for the lulz/fame.

In this case the bug is so bad and egregious, that publicizing it with the fix might have been the best thing to do -- no telling how many people have already discovered this or how long it would take Apple to fix.

Yes, let's educate each other about what responsible disclosure WITH A DEADLINE TO FIX looks like, but don't assume this person just wanted internet points. And now that the report and a workaround are out there, at least it can be mitigated personally.

Though I imagine there will be some SERIOUS hijinks that result from this until Apple fixes it because it is so easy to do. :(

migueh

2017-11-28
If I could just use Mavericks and develop apps for last iOS release, that will be great. But I should update to High Sierra. I hate this.

High Sierra seems to be focused in Emojis. Urghh

alpb

2017-11-28
[meta] I think this thread is currently being downvoted, or dragged down by the mods somehow. It should be in the #1 right now. I suspect people are flagging/downvoting because there is no responsible disclosure in this case.

DonHopkins

2017-11-28
Pyramid's OSx version of Unix (a dual-universe Unix supporting both 4.xBSD and System V) [1] had a bug in the "passwd" program, such that if somebody edited /etc/passwd with a text editor and introduced a blank line (say at the end of the file, or anywhere), the next person who changed their password with the setuid root passwd program would cause the blank line to be replaced by "::0:0:::" (empty user name, empty password, uid 0, gid 0), which then let you get a root shell with 'su ""', and log in as root by pressing the return key to the Login: prompt. (Well it wasn't quite that simple. The email explains.)

https://en.wikipedia.org/wiki/Pyramid_Technology

Here's the email in which I reported it to the staff mailing list.

    Date: Tue, 30 Sep 86 03:53:12 EDT
    From: Don Hopkins <don@brillig.umd.edu>
    Message-Id: <8609300753.AA22574@brillig.umd.edu>
    To: chris@mimsy.umd.edu, staff@mimsy.umd.edu,
            Pete "Gymble Roulette" Cottrell <pete@mimsy.umd.edu>
    In-Reply-To: Chris Torek's message of Mon, 29 Sep 86 22:57:57 EDT
    Subject: stranger and stranger and stranger and stranger and stranger

       Date: Mon, 29 Sep 86 22:57:57 EDT
       From: Chris Torek <chris@mimsy.umd.edu>

       Gymble has been `upgraded'.

       Pyramid's new login program requires that every account have a
       password.

       The remote login system works by having special, password-less
       accounts.

       Fun.

    Pyramid's has obviously put a WHOLE lot of thought into their nifty
    security measures in the new release. 

    Is it only half installed, or what? I can't find much in the way of
    sources. /usr/src (on the ucb side of the universe at lease) is quite
    sparse. 

    On gymble, if there is a stray newline at the end of /etc/passwd, the
    next time passwd is run, a nasty little "::0:0:::" entry gets added on
    that line! [Ye Olde Standard Unix "passwd" Bug That MUST Have Been Put
    There On Purpose.] So I tacked a newline onto the end with vipw to see
    how much fun I could have with this....

    One effect is that I got a root shell by typing:

    % su ""

    But that's not nearly as bad as the effect of typing:

    % rlogin gymble -l ""

    All I typed after that was <cr>:

    you don't hasword: New passhoose one new
    word: <cr>
    se a lonNew passger password.
    word: <cr>
    se a lonNew password:ger password.
    <cr>
    Please use a longer password.
    Password: <cr>
    Retype new password: <cr>
    Connection closed

    Yes, it was quite garbled for me, too: you're not seeing things, or on
    ttyh4. I tried it several times, and it was still garbled. But I'm not
    EVEN going to complain about it being garbled, though, for three
    reasons: 1) It's the effect of a brand new Pyramid "feature", and
    being used to their software releases, it seems only trivial cosmetic,
    comparitivly.  2) I want to be able to get to sleep tonight, so I'm
    just going to pretend it didn't happen. 3) There are PLEANTY of things
    to complain about that are much much much worse. [My guess, though,
    would be that something is writing to /dev/tty one way, and something
    else isn't.]  Except for this sentence, I will also completely ignore
    the fact that it closed the connection after setting the password, in
    a generous fit of compassion for overworked programmers with
    ridiculous deadlines.

    So then there was an entry in /etc/passwd where the ::0:0::: had been:

    :7h37OHz9Ww/oY:0:0:::

    i.e., it let me insist upon a password it thought was too short by
    repeating it. (A somewhat undocumented feature of the passwd program.)
    ("That's not a bug, it's a feature!")

    Then instead of recognizing an empty string as meaning no password,
    and clearing out the field like it should, it encrypted the null
    string and stuck it there. PRETTY CHEEZY, PYRAMID!!!! That means
    grepping for entries in /etc/passwd that have null strings in the
    password field will NOT necessarily find all accounts with no
    password. 

    So just because I was enjoying myself so much, I once again did:

    % rlogin gymble -l ""

    Password: <cr>
    [ message of the day et all ]
    #

    Wham, bam, thank you man! Instead of letting me in without prompting
    for a password [like it should, according to everyone but pyramid], or
    not allowing a null password and insisting I change it [like it
    shouldn't, according to everyone but pyramid], it asked for a
    password. I hit return, and sure enough the encrypted null string
    matched what was in the passwd entry. It was quite difficult to resist
    the temptation of deleting everyone's files and trashing the root
    partition.

        -Don

    P.S.: First one to forward this to Pyramid is a turd.
P.P.S.: The origin story of Pete's "Gymble Roulette" nick-name is here: http://art.net/~hopkins/Don/text/gymble-roulette.html The postscript comment was an oblique reference to the fact that I'd previously gotten in trouble for forwarding Pete's hilarious "Gymble Roulette" email to a mailing list and somehow it found its was back to Pyramid. In my defense, he did say "Tell your friends and loved ones.")

tbarbugli

2017-11-28
So far the best mitigation I could find out is to enable the root account and set a strong password for it. Hopefully we'll get a security update quickly so that I disable root access again. While checking on this I also realized I was running 10.13 instead of 10.13.1 which fixes another major security flaw (key chain saves in plain text)

2trill2spill

2017-11-28
Besides for APFS what user visible killer features has Apple made to Mac OS since 10.6.8? I'm sure they have made internal non user visible improvements to their kernel and userland. But it seems most of the "changes" to Mac OS is just churning code, or at least it seems that way from the outside.

To me personally 10.6.8 + Security Updates + APFS is extremely close to the ideal operating system.

spsful

2017-11-28
workaround: ENABLE ROOT USER AS FAST AS POSSIBLE

https://support.apple.com/en-us/HT204012

mk89

2017-11-28
Apple proves they still care about UX: finally, I found a way to login without typing.

api

2017-11-28
But there are new emojis, and emoji karaoke works!

abritishguy

2017-11-28
Just in case it is relevant for anyone here this is what our security team have established thus far:

- Can be mitigated by enabling the root user with a strong password

- Can be detected with `osquery` using `SELECT * FROM plist WHERE path = "/private/var/db/dslocal/nodes/Default/users/root.plist" AND key = "passwd" AND length(value) > 1;";`

- You can see what time the root account was enabled using `SELECT * FROM plist WHERE path = "/private/var/db/dslocal/nodes/Default/users/root.plist" WHERE key = "accountPolicyData";` then base 64 decoding that into a file and then running `plutil -convert xml1` and looking at the `passwordLastSetTime` field.

Note: osquery needs to be running with `sudo` but if you have it deployed across a fleet of macs as a daemon then it will be running with `sudo` anyway.

butterisgood

2017-11-28
Doesn't work for me on a freshly installed MacOS High Sierra, but does work on an upgraded laptop to High Sierra.

Interesting...

Also the UX is different. Typing root on the fresh installed one fails, then resets the user text box to my name, and if I type root again it doesn't let me it.

On the upgraded laptop, if I type root, it sticks and clicking unlock twice gets me in.

VeejayRampay

2017-11-28
Doesn't matter, Apple gets an automatic pass.

DonHopkins

2017-11-28
I wonder if you can also defeat Face ID by wearing a white face mask?

https://images-na.ssl-images-amazon.com/images/I/51I4nsyt9AL...

runesoerensen

2017-11-28
Apple suggests the workaround also discussed in this thread until the issue is fixed:

"We are working on a software update to address this issue. In the meantime, setting a root password prevents unauthorized access to your Mac. To enable the Root User and set a password, please follow the instructions here: https://support.apple.com/en-us/HT204012. If a Root User is already enabled, to ensure a blank password is not set, please follow the instructions from the ‘Change the root password’ section."

https://techcrunch.com/2017/11/28/astonishing-os-x-bug-lets-...

beedogs

2017-11-28
When you're too busy as a company making sure the corners of your products are sufficiently rounded, you get things like this.

mygo

2017-11-28
My computer automatically downloaded high sierra without me wanting it to. Whether I was tricked into clicking something I don’t know. And then I heard about the disk utility password bug and decided I should wait a while before installing this OS— it seems as though Apple wants me to do their QA for them. And now I hear about this. And I see that dumb ugly notch on the iPhone X (seriously who approved that design decision?). And the 2015 MacBook Pro is more pro than the 2016 model? Apple is officially a tribute band, riding on the fame of its previous self. And I say this as someone who owns a MacBook Pro, MacBook Air, iPad Pro, iPhone, and Apple Watch. This comes from a place of love. You’re trendy now, but don’t you forget that trendy people will leave you for the next shiny thing in an instant. Please fire everyone who is just there to milk the profits, actually put some focus back into QA, and remember who your base was.

setgree

2017-11-28
It seems as though buying a new apple product or upgrading one to new software implicitly signs you up to be a beta tester. It's pretty surprising from the world's most valuable company, no?

j-pb

2017-11-28
Oh god, seriously what happened to apple? They are the richest company in the world and the quality of their software has kept declining every year. Right now there is no computer system that I can wholeheartedly recommend to non technical people... :(

danjoc

2017-11-28
The person who found this is at greatest risk. Public disclosure keeps him safe.

"Oh, good boy. Thanks for the responsible disclosure. You're sure you haven't told ANYONE else about this? Great! Keep it that way and we'll send you a big check real soon. Promise!"

Coordinates acquired.

Boom.

Keep in mind, Apple was caught working directly with NSA in Snowden disclosures. The US government will drone strike people outside the US without trial or charges. Apple illegally SWATed a Gizmodo reporter over a leaked iPhone prototype.

I don't blame this Turkish national, not one bit.

sallyfour

2017-11-28
I'm unsurprised, loginwindow is a piece of shit nobody wants to work on. Poor dude.

jamesma

2017-11-28
1

uean

2017-11-28
I haven't seen anyone mention this critical part of the flaw - if you disable the root account, then log out and log back in, the root account is active again.

Password change is the only protection until it is patched.

martell

2017-11-28
Seems as though this tweet is not the first time it came up in public. Nov 13, 2017 12:48 PM

https://forums.developer.apple.com/thread/79235

Screenshot. http://oi67.tinypic.com/2h6embp.jpg

tim333

2017-11-28
Temporary workaround (pasted from http://www.bbc.com/news/technology-42161823)

While Apple works on its fix, it offered a workaround for users concerned about the bug.

“Setting a root password prevents unauthorized access to your Mac,” the company explained.

"To enable the Root User and set a password, please follow the instructions here: https://support.apple.com/en-us/HT204012.

---

Edit - for me those Apple instructions didn't work. This seemed to:

Search for 'Directory Utility' in Spotlight and click it.

Click the lock to make changes

Select 'Enable root user' from 'Edit' on the main menu and set a password.

KyeRussell

2017-11-28
This post reminded me of why Twitter is a pretty awful place.

The replies to this tweets are all everyones snarky comments to the @AppleSupport account or their edgy 'hot takes' on the issue. @AppleSupport responded promptly - albeit obviously out of their depth, and a bunch of people couldn't help but make fun of this fact. It's almost like tweeting to Apple's customer support account is not the best way to report a vulnerability?

Responsible disclosure has a proven history of working. When the vulnerability is appropriately patched and disclosed to the public, there is still a lot of backlash. You only need to look at the recent responsibly disclosed vulnerabilities for proof of this. Instead, we have a bunch of armchair analysts—who don't at all seem to be driven by past occurrences / existing data in any way—claiming that it didn't work.

jaequery

2017-11-28
if someone has discovered a way to wipe anyones paypal account, should he disclose it privately or let it trend on social media? and lets say the fix will take about a day at the earliest.

myrandomcomment

2017-11-28
https://support.apple.com/en-us/HT204012

How to set root password.

dailyvijeos

2017-11-28
Apple along with a decline in product utility, reliability and quality, their software has been getting buggier every year post-Jobs. The QA people should be fired and replaced with a team whom insists on perfection. Otherwise, these embarrassing incidents will repeat, errode their brand and encourage customers to seek other platforms.

dtf

2017-11-28
Amazingly, this was disclosed offhand on the Apple developer forums, two weeks ago (see final comment by chethan177):

https://forums.developer.apple.com/thread/79235

(spotted by https://twitter.com/fristle/status/935670476214378496)

philliphaydon

2017-11-28
No one else has mentioned it seems, digging through the twitter comments I found a tweet which states this was already known by Apple, and posted on the forums in the form of a solution...

https://forums.developer.apple.com/thread/79235#277225

runesoerensen

2017-11-28
"Perhaps nobody noticed two weeks ago when the root login vulnerability in macOS High Sierra was shared as a helpful tip on Apple’s own Developer forums. https://forums.developer.apple.com/thread/79235 "

https://twitter.com/fristle/status/935670476214378496

temporary57657

2017-11-28
The only current solution is to leave root enabled and change the password to something strong until this is patched by Apple.

Disabling root re-enables the blank password to root.

Exuma

2017-11-28
I wonder when/what Apple's response will be

knodi

2017-11-28
High Sierra has been one of the worst OSX upgrade.

anachronicnomad

2017-11-28
I was able to successfully fix this by using the

``` dsenableroot ```

utility; by first enabling the root user with a strong password, then disabling it with the

``` dsenableroot -d ```

option. It's heavily recommended to not leave the root user enabled.

ghaydarov

2017-11-28
Wow. Can't believe it. It's true.

mthoodlum

2017-11-28
Press "command" and the "space" keys at the same time.

In the Spotlight Search type "Terminal" and press enter.

At the terminal type "passwd" and press enter.

The terminal will prompt you to change the password for "root".

dawnerd

2017-11-28
There's no way this wasn't being used prior to being publicized on twitter. I'm sure the FBI/etc was on this day one.

ddmma

2017-11-28
Apple is the new Internet Explorer

theoutlander

2017-11-28
Kudos for reporting this publicly! We need this kind of stuff exposed publicly so that companies fix the issue and force an update. At the same time, consumers should be made aware of what security holes look like and what the risks are. Apple has been getting away with this stuff for a while now.

Do you think a hacker with ill-intent would have reported this issue at all?

lgxz

2017-11-28
the MOST STUPID OS bug FOREVER?

stmw

2017-11-28
Imagine what Steve Jobs would've said in a meeting today at Apple HQ to discuss this incident.

"Can someone here explain to me what is the login dialog supposed to do? ... Ok. Then why the !@#% doesn't it do that???"

martins_irbe

2017-11-28
This clearly is a feature!

cm2187

2017-11-28
Does it affect MacOS Server?

oh-kumudo

2017-11-28
LOL. Can we call this...front door?

aosmith

2017-11-28
Does this work from single user mode?

fastball

2017-11-28
I miss Snow Leopard.

:/

_gjrn

2017-11-28
Apple uses the slogan for High Sierra: "Your Mac. Elevated."

Kind of ironic that you can easily get elevated privileges with it.

abdullahi1

2017-11-28
This is hilarious. I wonder why it took so long for this bug to be discovered, I mean, wasn't High Sierra released back in September?

zargath

2017-11-28
I guess we finally figured out what the "insanely" great products was all about.

corecoder

2017-11-28
How come nobody has picked a name for this vulnerability?

codeisawesome

2017-11-28
What does this say about the state of iOS security? I don’t know how to hope that my phone isn’t 0wned already. I’m not saying this from my high horse - more as a disappointed user who invested a lot of money in my Apple phone.

teddyh

2017-11-28
I see a lot of comments here wondering why Apple seems to not care about software quality anymore. I don’t know if that’s true, but there’s a perfectly obvious answer: They don’t have to.

Software quality in macOS was important back when they were trying to get people to switch from Windows-based PCs to Macs. Nowadays, most people who were going to switch have already switched, so Apple has no incentive to keep up the same level of software quality anymore. They just have to keep people locked into their ecosystem (with iPhone etc.) enough that the barrier to switch out again is high enough.

There is no reason for Apple to improve macOS, since doing so won’t make anyone switch to Macs who hasn’t already switched, and not improving macOS won’t make anyone upset enough to switch back. Ergo, Apple leaves macOS to stagnate, and they will keep macOS at this bad-but-not-horrible-enough-to-switch level for the foreseeable future.

That’s my theory, anyway.

qualitytime

2017-11-28
Top 10 software blunders of all time:

1) (Apple) 1 + 2 + 3 = 24 https://news.ycombinator.com/item?id=15538666

2) (Apple) Blank root password https://news.ycombinator.com/item?id=15800676

3) ...

TonnyGaric

2017-11-28
Apple released the following statement regarding this bug:

"We are working on a software update to address this issue. In the meantime, setting a root password prevents unauthorized access to your Mac. To enable the Root User and set a password, please follow the instructions here: https://support.apple.com/en-us/HT204012. If a Root User is already enabled, to ensure a blank password is not set, please follow the instructions from the ‘Change the root password’ section."

therealmarv

2017-11-28
Is this also in 10.13.2 beta?

qubex

2017-11-28
This is why I use disk encryption.

gkanai

2017-11-28
This is indeed a bad black mark on Apple. With all the money they have, it's terrible that they let this one slip by.

I'm still on 10.12 Sierra. Long ago I stopped major updating when those releases were new. I learned to wait months or many months for bugs to be dealt with and for older software to be updated to be compatible with the new release. High Sierra provides nothing critical that Sierra does not provide, and thus, I am happy in my position as late adopter.

itsthejb

2017-11-28
Apple software quality has got very sloppy (again). I recall it was particularly bad around 2014, but then seemed to have improved. Seems the sloppiness is back again. It would seem Apple is no unique in the regard that its success has made it fat and lazy. My particular favourite one at the moment is that in iOS 11.1.2 navigation transition animations eventually break if the device is running long enough (a few days). Restarting the device fixes this. The fun part is trying to work out why on earth this would be? Transition animations are cached?

submeta

2017-11-28
Went to the next Apple store. Tried it out. It works. Can't believe it. Thousands of Macs are vulnerable. I'm wondering how fast all of these devices will be patched. Even if there is an update next week: How many devices won't get updated for quite some time. Unbelievable.

willyt

2017-11-28
Security update just came out. Installed it and can no longer reproduce. Can anyone confirm?

tolien

2017-11-28

senthilnayagam

2017-11-28
patch has been released in record time, I have update my mac

https://support.apple.com/en-in/HT208315

jason_slack

2017-11-28
There is also now a patch available.

eevilspock

2017-11-28

rilex1

2017-11-28
kk