https://objectivebythesea.org/v8/talks.html#Speaker_18
Compressor is part of Apple Pro Apps. With seamless integration with Final Cut Pro, it empowers the editing workflow to deliver industry standard video. When I was learning video production for my hobby, I discovered this attack surface that could put content creators and even film producers at risk, leading to unauthenticated 0-click remote code execution from LAN. It is worth mentioning that the problematic code is shared among Final Cut Pro, Motion and Compressor, but only Compressor is vulnerable.
In this talk, I will cover the reverse engineering process on Objective-C++ binaries, network protocol analysing, and how to put the primitives together as a logic chain to obtain full remote code execution. During the report process, App Sandbox was shipped, blocking the initial version of the exploit, but I managed to bypass it with better primitives.