This is a Proof-of-Concept Mac Application that demonstrates the RootPipe Privilege Escalation Vulnerability (CVE-2015-1130) identified by Emil Kvarnhammar from TrueSec
This demo was written in Objective-C, ported from the Python PoC here: RootPipe
To use, simply give a path to a file that you want to have escalated permissions, then provide the path where you want the file to be copied to with the escalated permissions, then provide your permissions in octal format (i.e. 04777), and (optionally) provide the file owner name and group.
Mac OS X 10.9 - Mac OS X 10.10.2
MIT license. Copyright © 2015 Shmoopi LLC.