An issue in Loom through 0.196.1 on macOS allows a remote attacker to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings.
With this tool, we can check if the App is Vulnerable:
![image](https://private-user-images.githubusercontent.com/83291215/299688317-f52a84d7-57a2-4ed5-ac47-51adf962be49.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.IWBTG3d4ibhw68z0JbmDkjPKF4Q8cTliiSox6YehjD0)
After validation, we can inject our code, and get a shell
![image](https://private-user-images.githubusercontent.com/83291215/299688518-0675b594-4f0a-4159-8895-f2a74e6764d0.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJnaXRodWIuY29tIiwiYXVkIjoicmF3LmdpdGh1YnVzZXJjb250ZW50LmNvbSIsImtleSI6ImtleTUiLCJleHAiOjE3Mzk0NDE1MzksIm5iZiI6MTczOTQ0MTIzOSwicGF0aCI6Ii84MzI5MTIxNS8yOTk2ODg1MTgtMDY3NWI1OTQtNGYwYS00MTU5LTg4OTUtZjJhNzRlNjc2NGQwLnBuZz9YLUFtei1BbGdvcml0aG09QVdTNC1ITUFDLVNIQTI1NiZYLUFtei1DcmVkZW50aWFsPUFLSUFWQ09EWUxTQTUzUFFLNFpBJTJGMjAyNTAyMTMlMkZ1cy1lYXN0LTElMkZzMyUyRmF3czRfcmVxdWVzdCZYLUFtei1EYXRlPTIwMjUwMjEzVDEwMDcxOVomWC1BbXotRXhwaXJlcz0zMDAmWC1BbXotU2lnbmF0dXJlPTM4OWU1ZDRmYTJhNWI4YTQ3ZmZjNTAyMzZhODNkYWYzMmYzOTAxZGU3N2Q5MWIzODQyYzk2NTA4MmMyNDI1NzcmWC1BbXotU2lnbmVkSGVhZGVycz1ob3N0In0.9i2cPk8ZlbLJG_biEkchaW5-E7622XV1QrlUYBLEIB0)
Enjoy Your Shell :)