<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Race-Condition on harpi - Security Researcher</title><link>https://harpi.cc/tags/race-condition/</link><description>Recent content in Race-Condition on harpi - Security Researcher</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 06 Apr 2026 16:04:01 +0300</lastBuildDate><atom:link href="https://harpi.cc/tags/race-condition/index.xml" rel="self" type="application/rss+xml"/><item><title>The Binary Switcheroo: Turning a KDE File Manager Into a Local Privilege Escalation</title><link>https://harpi.cc/blog/cves/kde-kio-admin/</link><pubDate>Thu, 15 May 2025 00:00:00 +0000</pubDate><guid>https://harpi.cc/blog/cves/kde-kio-admin/</guid><description>&lt;blockquote>
&lt;p>&lt;em>&amp;ldquo;When you want to know how things really work, study them when they&amp;rsquo;re coming apart.&amp;rdquo;&lt;/em> — William Gibson&lt;/p>&lt;/blockquote>
&lt;h2 id="how-i-got-here">How I Got Here&lt;/h2>
&lt;p>In late 2024 I scoped out an engagement for &lt;a href="https://www.radicallyopensecurity.com/">Radically Open Security&lt;/a> targeting &lt;code>kio-admin&lt;/code> — the KDE component that gives Dolphin (KDE&amp;rsquo;s file manager) the ability to perform file operations as root. The proposal was straightforward:&lt;/p>
&lt;blockquote>
&lt;p>Code audit and pentesting of &lt;code>Dolphin&lt;/code> authorisation mechanisms as they are provided by &lt;code>kio-admin&lt;/code> and &lt;code>kio&lt;/code> framework.&lt;/p></description></item></channel></rss>