Atlassian Companion for macOS has a serious remote code execution vulnerability that was just found. It is called CVE-2023-22524. This flaw is a major security risk because it lets attackers get around both the app’s blocklist and macOS Gatekeeper, which could allow harmful code to run.

This piece will go into the technical details of this vulnerability, look at how to make it happen again, and talk about what it means for macOS users. This proof of concept (PoC) is meant to show how bad the problem is and how quickly people need to take the right steps to protect themselves.


This repository contains a proof of concept (PoC) for the recently discovered remote code execution vulnerability in Atlassian Companion for macOS, identified as CVE-2023-22524. This critical issue allows attackers to bypass the app’s blocklist and macOS Gatekeeper, leading to potential execution of harmful code.


The vulnerability stems from an oversight in the application’s handling of certain file types and its interaction with macOS security features. For a detailed analysis of the vulnerability, including the discovery process and technical specifics, please refer to our comprehensive blog post on theĀ Imperva Threat Research Blog

Steps to Reproduce

  1. Atlassian Companion < 2.0.0 is required.
  2. Clone this repository, navigate to the PoC directory, and run node server.js.
  3. Visit http://localhost:8080/example.html in your browser and follow the instructions.

Additional Information

Published by Tamil S

Tamil has a great interest in the fields of Cyber Security, OSINT, and CTF projects. Currently, he is deeply involved in researching and publishing various security tools with Kali Linux Tutorials, which is quite fascinating.

Leave a comment

Your email address will not be published. Required fields are marked *